Library
My library

Add to library

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Freezer.830 16.02.2006 --- Show
Freew.718 16.02.2006 --- Show
Freew.692 16.02.2006 --- Show
Freedom.948 16.02.2006 --- Show
Freedom.3600 16.02.2006 --- Show
Freedom.2560 16.02.2006 --- Show
Freedom.2448 16.02.2006 --- Show
Freddy.2271 16.02.2006 --- Show
Freddy.1870 16.02.2006 --- Show
Freddy.1663 16.02.2006 --- Show
Fred.657 16.02.2006 --- Show
Freak.938 16.02.2006 --- Show
SillyRE.666 16.02.2006 --- Show
Frankenstein 16.02.2006 --- Show
Kuku.649 16.02.2006 --- Show
Fractal.2979 16.02.2006 --- Show
Fox.5425 16.02.2006 --- Show
Trojan.Fox.1126 16.02.2006 --- Show
Fox.2640 16.02.2006 --- Show
Trojan.Fox.317 16.02.2006 --- Show
Sahand.1707 16.02.2006 --- Show
Fowl.3072 16.02.2006 --- Show
FourWeeks.2062 16.02.2006 --- Show
FourSeasons.1534 16.02.2006 --- Show
4on.1346 16.02.2006 --- Show
FrodoSoft.590 16.02.2006 --- Show
HKill.1471 16.02.2006 --- Show
HLLP.Forth 16.02.2006 --- Show
Trojan.DiskEraser.291 16.02.2006 --- Show
Trojan.FormatC.313 16.02.2006 --- Show
Trojan.FormatC.5680 16.02.2006 --- Show
V2Px.1190 16.02.2006 --- Show
Trojan.FormatC.33648 16.02.2006 --- Show
Trojan.KillFiles.11692 16.02.2006 --- Show
Trojan.FormatC.9384 16.02.2006 --- Show
Trojan.FormatC.46 16.02.2006 --- Show
Trojan.FormatC.1656 16.02.2006 --- Show
Formas.1146 16.02.2006 --- Show
DiskPlus.1385 16.02.2006 --- Show
Forever.896 16.02.2006 --- Show
Foo.956 16.02.2006 --- Show
Fonx.1958 16.02.2006 --- Show
Trojan.Inca 16.02.2006 --- Show
Phone.688 16.02.2006 --- Show
Folko.512 16.02.2006 --- Show
Fog.AirRaid.1731 16.02.2006 --- Show
Fog.AirRaid.1743 16.02.2006 --- Show
Fog.AirRaid.1728 16.02.2006 --- Show
Shoe.1904 16.02.2006 --- Show
V2Px.1236 16.02.2006 --- Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.