Library
My library

Add to library

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Beer.3299 16.02.2006 --- Show
Beer.2838 16.02.2006 --- Show
Beer.3192 16.02.2006 --- Show
Beer.3164 16.02.2006 --- Show
Beer.3490 16.02.2006 --- Show
Beer.2473 16.02.2006 --- Show
Beer.Kalinka.3225 16.02.2006 --- Show
Beer.Kalinka.3612 16.02.2006 --- Show
Beer.Kalinka.3434 16.02.2006 --- Show
Beer.3047 16.02.2006 --- Show
Beer.3441 16.02.2006 --- Show
Beer.2984 16.02.2006 --- Show
Beer.2978 16.02.2006 --- Show
Beer.2794 16.02.2006 --- Show
Beer.1791 16.02.2006 --- Show
Beer.1835 16.02.2006 --- Show
Beer.2850 16.02.2006 --- Show
Beer.2620 16.02.2006 --- Show
Beer.1933 16.02.2006 --- Show
Beer.1928 16.02.2006 --- Show
Beer.1787 16.02.2006 --- Show
Beeper.957 16.02.2006 --- Show
Beep.2000 16.02.2006 --- Show
Beech.439 16.02.2006 --- Show
Beda.883 16.02.2006 --- Show
Beda.552 16.02.2006 --- Show
Beda.337 16.02.2006 --- Show
Beda.420 16.02.2006 --- Show
Beda.419 16.02.2006 --- Show
Beda.395 16.02.2006 --- Show
Beda.332 16.02.2006 --- Show
Beda.3291 16.02.2006 --- Show
Beda.3233 16.02.2006 --- Show
Beda.1724 16.02.2006 --- Show
Beda.1857 16.02.2006 --- Show
Beda.1530 16.02.2006 --- Show
Beda.1314 16.02.2006 --- Show
Beda.1301 16.02.2006 --- Show
Beda.1196 16.02.2006 --- Show
Bebe.486 16.02.2006 --- Show
Bebe.1004 16.02.2006 --- Show
MPC.831 16.02.2006 --- Show
Beavis.671 16.02.2006 --- Show
Beavis.657 16.02.2006 --- Show
Leprosy.Beavis.201 16.02.2006 --- Show
Beavis 16.02.2006 --- Show
Idie.3520 16.02.2006 --- Show
Beast-NB.498 16.02.2006 --- Show
SGWW.Beast.1465 16.02.2006 --- Show
SGWW.Beast.1371 16.02.2006 --- Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.