Library
My library

Add to library

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Kiev.2048 16.02.2006 --- Show
Kid.based 16.02.2006 --- Show
Frizer.Kid.256 16.02.2006 --- Show
Kicsit.592 16.02.2006 --- Show
Ki.962 16.02.2006 --- Show
Khrusha.1505 16.02.2006 --- Show
Khmir.1800 16.02.2006 --- Show
Khizhnjak.1179 16.02.2006 --- Show
Khizhnjak.1147 16.02.2006 --- Show
Khizhnjak.822 16.02.2006 --- Show
Khizhnjak.810 16.02.2006 --- Show
Khizhnjak.768 16.02.2006 --- Show
Khizhnjak.752 16.02.2006 --- Show
Khizhnjak.556 16.02.2006 --- Show
Khizhnjak.542 16.02.2006 --- Show
Khizhnjak.494 16.02.2006 --- Show
Khizhnjak.466 16.02.2006 --- Show
Khizhnjak.444 16.02.2006 --- Show
Khizhnjak.406 16.02.2006 --- Show
Khizhnjak.1912 16.02.2006 --- Show
Khizhnjak.1610 16.02.2006 --- Show
Khizhnjak.1134 16.02.2006 --- Show
Khizhnjak.1133 16.02.2006 --- Show
Khizhnjak.1112 16.02.2006 --- Show
Khizhnjak.1101 16.02.2006 --- Show
Khizhnjak.452 16.02.2006 --- Show
Xmm.1107 16.02.2006 --- Show
Khai.1835 16.02.2006 --- Show
KgkSoft.1020 16.02.2006 --- Show
KF.1367 16.02.2006 --- Show
KF.1361 16.02.2006 --- Show
Trojan.KeyTrap.999 16.02.2006 --- Show
Trojan.KeySpy.989 16.02.2006 --- Show
Capricorn.2984 16.02.2006 --- Show
Keypress.2728 16.02.2006 --- Show
Keypress.Platon 16.02.2006 --- Show
Keypress.935 16.02.2006 --- Show
Keypress.1000 16.02.2006 --- Show
Keypress.1600 16.02.2006 --- Show
Keypress.1479 16.02.2006 --- Show
Keypress.1216 16.02.2006 --- Show
Keypress.1232 16.02.2006 --- Show
Keypress.1212 16.02.2006 --- Show
Keypress.Samsoft 16.02.2006 --- Show
Keypress.1266 16.02.2006 --- Show
Keypress.1250 16.02.2006 --- Show
Trojan.KeyLogger.9355 16.02.2006 --- Show
Trojan.Keylog.25 16.02.2006 --- Show
Keydrop.dropper 16.02.2006 --- Show
Keydrop 16.02.2006 --- Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.