Library
My library

Add to library

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
BackDoor.IRC.Mateusx 16.02.2006 --- Show
Win32.HLLW.Matos 16.02.2006 --- Show
Win32.HLLW.Drof 16.02.2006 --- Show
Win32.HLLW.Wireg 16.02.2006 --- Show
Win32.HLLW.Waper 16.02.2006 --- Show
Win32.HLLW.Dexam 16.02.2006 --- Show
Win32.HLLW.Hilin 16.02.2006 --- Show
Win32.HLLW.Mario 16.02.2006 --- Show
Win32.HLLW.Callof 16.02.2006 --- Show
Win32.HLLC.Sam.1536 16.02.2006 --- Show
Win32.HLLC.Sam.2048 16.02.2006 --- Show
BackDoor.Telnet.13 16.02.2006 --- Show
Win32.HLLW.Sites 16.02.2006 --- Show
Win32.HLLW.Shut 16.02.2006 --- Show
Win32.HLLW.Showgame 16.02.2006 --- Show
Win32.HLLW.Generic.180 16.02.2006 --- Show
Win32.HLLW.Shower.61440 16.02.2006 --- Show
Win32.HLLW.Generic.9 16.02.2006 --- Show
Exploit.3CServer 16.02.2006 --- Show
Win32.HLLW.Shorm.58880 16.02.2006 --- Show
Win32.HLLW.Shorm.47104 16.02.2006 --- Show
Win32.HLLW.Shorm.59904 16.02.2006 --- Show
Win32.HLLW.Shorm.47616 16.02.2006 --- Show
Win32.HLLW.Shorm.61440 16.02.2006 --- Show
Win32.HLLW.Shorm.24 16.02.2006 --- Show
Win32.Shorm.23552 16.02.2006 --- Show
Win32.HLLW.Shorm.53248 16.02.2006 --- Show
Win32.HLLW.Shorm.51712 16.02.2006 --- Show
Win32.HLLW.Shorm.44544 16.02.2006 --- Show
Win32.HLLW.Shorm.16896 16.02.2006 --- Show
Win32.HLLW.Shorm.16986 16.02.2006 --- Show
Win32.HLLW.Shorm.51200 16.02.2006 --- Show
Win32.HLLW.Shorm.53760 16.02.2006 --- Show
Win32.HLLW.Shorm.48128 16.02.2006 --- Show
Win32.HLLW.Hlta 16.02.2006 --- Show
Win32.HLLM.Shoho 16.02.2006 --- Show
Win32.HLLM.Generic.307 16.02.2006 --- Show
Win95.Shoerec 16.02.2006 --- Show
Win32.HLLP.Shodi 16.02.2006 --- Show
Win32.HLLW.Shodi 16.02.2006 --- Show
Win32.HLLP.Shohdi.61470 16.02.2006 --- Show
Win32.HLLP.Shohdi.61457 16.02.2006 --- Show
Win32.HLLW.Shodan.9 16.02.2006 --- Show
Shinny.Generator.10 16.02.2006 --- Show
Win32.HLLC.Walrus.52224 16.02.2006 --- Show
Win32.HLLM.Shiba 16.02.2006 --- Show
Win32.HLLW.Minerva 16.02.2006 --- Show
Win32.HLLM.Shake 16.02.2006 --- Show
Win32.Sharp.7680 16.02.2006 --- Show
Win32.Sharp.12288 16.02.2006 --- Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.