Library
My library

Add to library

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Frog.1744 16.02.2006 --- Show
Frog.1739 16.02.2006 --- Show
Frog.1630 16.02.2006 --- Show
Frogs.1500 16.02.2006 --- Show
Frodo.4096 16.02.2006 --- Show
FrodoSoft.563 16.02.2006 --- Show
Grazie.1361 16.02.2006 --- Show
Friend.357 16.02.2006 --- Show
Friend.330 16.02.2006 --- Show
Friend.329 16.02.2006 --- Show
Friend.301 16.02.2006 --- Show
Friday13.414 16.02.2006 --- Show
Frida.538 16.02.2006 --- Show
Freezer.980 16.02.2006 --- Show
Freezer.830 16.02.2006 --- Show
Freew.718 16.02.2006 --- Show
Freew.692 16.02.2006 --- Show
Freedom.948 16.02.2006 --- Show
Freedom.3600 16.02.2006 --- Show
Freedom.2560 16.02.2006 --- Show
Freedom.2448 16.02.2006 --- Show
Freddy.2271 16.02.2006 --- Show
Freddy.1870 16.02.2006 --- Show
Freddy.1663 16.02.2006 --- Show
Fred.657 16.02.2006 --- Show
Freak.938 16.02.2006 --- Show
SillyRE.666 16.02.2006 --- Show
Frankenstein 16.02.2006 --- Show
Kuku.649 16.02.2006 --- Show
Fractal.2979 16.02.2006 --- Show
Fox.5425 16.02.2006 --- Show
Trojan.Fox.1126 16.02.2006 --- Show
Fox.2640 16.02.2006 --- Show
Trojan.Fox.317 16.02.2006 --- Show
Sahand.1707 16.02.2006 --- Show
Fowl.3072 16.02.2006 --- Show
FourWeeks.2062 16.02.2006 --- Show
FourSeasons.1534 16.02.2006 --- Show
4on.1346 16.02.2006 --- Show
FrodoSoft.590 16.02.2006 --- Show
HKill.1471 16.02.2006 --- Show
HLLP.Forth 16.02.2006 --- Show
Trojan.DiskEraser.291 16.02.2006 --- Show
Trojan.FormatC.313 16.02.2006 --- Show
Trojan.FormatC.5680 16.02.2006 --- Show
V2Px.1190 16.02.2006 --- Show
Trojan.FormatC.33648 16.02.2006 --- Show
Trojan.KillFiles.11692 16.02.2006 --- Show
Trojan.FormatC.9384 16.02.2006 --- Show
Trojan.FormatC.46 16.02.2006 --- Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.