Library
My library

Add to library

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Trojan.DownLoader.4767 16.02.2006 --- Show
Trojan.DownLoader.2885 16.02.2006 --- Show
Trojan.StartPage.753 16.02.2006 --- Show
Trojan.DownLoader.4863 16.02.2006 --- Show
Trojan.DownLoader.2761 16.02.2006 --- Show
Trojan.DownLoader.3796 16.02.2006 --- Show
Trojan.Proxy.546 16.02.2006 --- Show
Trojan.DownLoader.3537 16.02.2006 --- Show
Trojan.DownLoader.2690 16.02.2006 --- Show
Trojan.DownLoader.2206 16.02.2006 --- Show
Trojan.DownLoader.2507 16.02.2006 --- Show
Trojan.DownLoader.2304 16.02.2006 --- Show
Trojan.StartPage.696 16.02.2006 --- Show
Trojan.DownLoader.4230 16.02.2006 --- Show
Trojan.DownLoader.4231 16.02.2006 --- Show
Trojan.DownLoader.1978 16.02.2006 --- Show
Trojan.DownLoader.4609 16.02.2006 --- Show
Trojan.DownLoader.2740 16.02.2006 --- Show
Trojan.DownLoader.2245 16.02.2006 --- Show
Trojan.DownLoader.2985 16.02.2006 --- Show
Trojan.DownLoader.1039 16.02.2006 --- Show
Trojan.Click.387 16.02.2006 --- Show
Trojan.DownLoader.2471 16.02.2006 --- Show
Trojan.DownLoader.2287 16.02.2006 --- Show
Trojan.DownLoader.4796 16.02.2006 --- Show
Trojan.DownLoader.3235 16.02.2006 --- Show
Trojan.DownLoader.1656 16.02.2006 --- Show
Trojan.DownLoader.2356 16.02.2006 --- Show
Trojan.DownLoader.1643 16.02.2006 --- Show
Trojan.DownLoader.5559 16.02.2006 --- Show
Trojan.DownLoader.1726 16.02.2006 --- Show
Trojan.DownLoader.1474 16.02.2006 --- Show
Trojan.StartPage.375 16.02.2006 --- Show
Trojan.DownLoader.4756 16.02.2006 --- Show
Trojan.DownLoader.6307 16.02.2006 --- Show
Trojan.DownLoader.5862 16.02.2006 --- Show
Trojan.DownLoader.5992 16.02.2006 --- Show
Trojan.DownLoader.5245 16.02.2006 --- Show
Trojan.DownLoader.4851 16.02.2006 --- Show
Trojan.DownLoader.4791 16.02.2006 --- Show
Trojan.DownLoader.4716 16.02.2006 --- Show
Trojan.DownLoader.4693 16.02.2006 --- Show
Trojan.DownLoader.4555 16.02.2006 --- Show
Trojan.DownLoader.4325 16.02.2006 --- Show
Trojan.DownLoader.3857 16.02.2006 --- Show
Trojan.DownLoader.3871 16.02.2006 --- Show
Trojan.DownLoader.3237 16.02.2006 --- Show
Trojan.DownLoader.6423 16.02.2006 --- Show
Trojan.DownLoader.4381 16.02.2006 --- Show
Trojan.DownLoader.1475 16.02.2006 --- Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.