Library
My library

Add to library

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Trojan.Deltree.908 16.02.2006 --- Show
Trojan.Deltree.1935 16.02.2006 --- Show
Trojan.Deltree.1559 16.02.2006 --- Show
Trojan.Deltree.2829 16.02.2006 --- Show
Trojan.Deltree.765 16.02.2006 --- Show
Trojan.Deltree.2384 16.02.2006 --- Show
Trojan.Deltree.1382 16.02.2006 --- Show
Trojan.Deltree.2462 16.02.2006 --- Show
Trojan.Deltree.1586 16.02.2006 --- Show
Trojan.KillFiles.145 16.02.2006 --- Show
Trojan.KillMBR.768 16.02.2006 --- Show
Trojan.KillFiles.14733 16.02.2006 --- Show
Trojan.Zond.4171 16.02.2006 --- Show
Trojan.KillCMOS.7 16.02.2006 --- Show
Trojan.DownLoader.4748 16.02.2006 --- Show
Trojan.DownLoader.4650 16.02.2006 --- Show
Trojan.AVKill.1504 16.02.2006 --- Show
Trojan.Parmor 16.02.2006 --- Show
Trojan.KillFiles.3148 16.02.2006 --- Show
Trojan.KeyLogger.371 16.02.2006 --- Show
Trojan.Hablas.10 16.02.2006 --- Show
Trojan.Keylog.167 16.02.2006 --- Show
BAT.Dimo.1278 16.02.2006 --- Show
BAT.Dimo.38118 16.02.2006 --- Show
VBS.Generic.260 16.02.2006 --- Show
Trojan.Bomb.81 16.02.2006 --- Show
Trojan.Seeker.92 16.02.2006 --- Show
Trojan.Seeker.87 16.02.2006 --- Show
Trojan.Jidamob.1566 16.02.2006 --- Show
Win32.Necronom 16.02.2006 --- Show
Trojan.Dikshew.324 16.02.2006 --- Show
Exploit.Dfind 16.02.2006 --- Show
Trojan.Rev 16.02.2006 --- Show
Trojan.ICKiller 16.02.2006 --- Show
Huerta.4161 16.02.2006 --- Show
Trojan.Horny.112 16.02.2006 --- Show
Trojan.KeyLogger.377 16.02.2006 --- Show
Trojan.Hlam.10160 16.02.2006 --- Show
Trojan.PWS.Legmir.365 16.02.2006 --- Show
Trojan.PWS.Legmir.377 16.02.2006 --- Show
Trojan.PWS.Legmir.413 16.02.2006 --- Show
Trojan.PWS.Legmir.373 16.02.2006 --- Show
Trojan.MulDrop.3164 16.02.2006 --- Show
Trojan.Icqhaxor 16.02.2006 --- Show
Trojan.HackBBS 16.02.2006 --- Show
Trojan.Slamkey 16.02.2006 --- Show
Trojan.GWars 16.02.2006 --- Show
Trojan.Click.828 16.02.2006 --- Show
Trojan.FormatC.1094 16.02.2006 --- Show
Trojan.Godel 16.02.2006 --- Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.