Library
My library

Add to library

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Trojan.MulDrop.2120 16.02.2006 --- Show
Trojan.PWS.Banker.1517 16.02.2006 --- Show
Trojan.DownLoader.6908 16.02.2006 --- Show
Trojan.Proxy.707 16.02.2006 --- Show
Trojan.PWS.Legmir.483 16.02.2006 --- Show
Trojan.PWS.Banker.1516 16.02.2006 --- Show
Trojan.LowZones.150 16.02.2006 --- Show
Trojan.PWS.Banker.1518 16.02.2006 --- Show
Trojan.PWS.Legmir.462 16.02.2006 --- Show
Trojan.MulDrop.2380 16.02.2006 --- Show
Trojan.MulDrop.3297 16.02.2006 --- Show
Trojan.DownLoader.6909 16.02.2006 --- Show
Trojan.PWS.LDPinch.749 16.02.2006 --- Show
Trojan.Proxy.706 16.02.2006 --- Show
BackDoor.IRC.Sdbot.463 16.02.2006 --- Show
Trojan.PWS.LDPinch.750 16.02.2006 --- Show
Tool.CurrPorts.102 16.02.2006 --- Show
Trojan.DownLoader.4970 16.02.2006 --- Show
Trojan.MulDrop.1621 16.02.2006 --- Show
Trojan.DownLoader.5970 16.02.2006 --- Show
Trojan.MulDrop.976 16.02.2006 --- Show
Trojan.MulDrop.742 16.02.2006 --- Show
Trojan.MulDrop.537 16.02.2006 --- Show
Trojan.MulDrop.504 16.02.2006 --- Show
Trojan.MulDrop.16 16.02.2006 --- Show
Trojan.Westy 16.02.2006 --- Show
Trojan.MulDrop.601 16.02.2006 --- Show
Trojan.MulDrop.497 16.02.2006 --- Show
Trojan.MulDrop.2902 16.02.2006 --- Show
Trojan.MulDrop.2609 16.02.2006 --- Show
Trojan.MulDrop.2633 16.02.2006 --- Show
Trojan.Proxy.426 16.02.2006 --- Show
Trojan.DownLoader.4017 16.02.2006 --- Show
Trojan.DownLoader.6907 16.02.2006 --- Show
Trojan.MulDrop.2589 16.02.2006 --- Show
Trojan.MulDrop.2585 16.02.2006 --- Show
Trojan.DownLoader.3690 16.02.2006 --- Show
BackDoor.Iroffer.1241 16.02.2006 --- Show
Trojan.DownLoader.6897 16.02.2006 --- Show
BackDoor.Generic.1273 16.02.2006 --- Show
Trojan.PWS.Banker.1514 16.02.2006 --- Show
Trojan.KillFiles.485 16.02.2006 --- Show
Trojan.Proxy.699 16.02.2006 --- Show
Trojan.MulDrop.3033 16.02.2006 --- Show
BackDoor.Dumaru.40 16.02.2006 --- Show
Trojan.DownLoader.6902 16.02.2006 --- Show
Trojan.MulDrop.2494 16.02.2006 --- Show
Trojan.DownLoader.4979 16.02.2006 --- Show
Trojan.MulDrop.3132 16.02.2006 --- Show
Trojan.DownLoader.6903 16.02.2006 --- Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.