Library
My library

Add to library

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Adware.Bbt 16.02.2006 --- Show
Trojan.DownLoader.824 16.02.2006 --- Show
Trojan.DownLoader.4198 16.02.2006 --- Show
Trojan.DownLoader.3272 16.02.2006 --- Show
Trojan.Inject.17 16.02.2006 --- Show
Trojan.MulDrop.2307 16.02.2006 --- Show
Trojan.DownLoader.2541 16.02.2006 --- Show
Trojan.DownLoader.5191 16.02.2006 --- Show
Trojan.DownLoader.4467 16.02.2006 --- Show
Trojan.DownLoader.4447 16.02.2006 --- Show
Trojan.DownLoader.4593 16.02.2006 --- Show
Trojan.DownLoader.3864 16.02.2006 --- Show
BackDoor.Pauz 16.02.2006 --- Show
Trojan.DownLoader.5473 16.02.2006 --- Show
Trojan.DownLoader.2442 16.02.2006 --- Show
Trojan.DownLoader.3775 16.02.2006 --- Show
Trojan.DownLoader.3329 16.02.2006 --- Show
Trojan.DownLoader.6042 16.02.2006 --- Show
Trojan.DownLoader.3828 16.02.2006 --- Show
Trojan.DownLoader.4353 16.02.2006 --- Show
Trojan.MulDrop.926 16.02.2006 --- Show
VBS.Generic.437 16.02.2006 --- Show
Trojan.DownLoader.3396 16.02.2006 --- Show
Trojan.Isbar.339 16.02.2006 --- Show
Trojan.Isbar.350 16.02.2006 --- Show
Trojan.Isbar.313 16.02.2006 --- Show
Trojan.Isbar.319 16.02.2006 --- Show
Trojan.Click.679 16.02.2006 --- Show
Trojan.LowZones.87 16.02.2006 --- Show
Trojan.LowZones.101 16.02.2006 --- Show
Trojan.Isbar.332 16.02.2006 --- Show
Trojan.Isbar.271 16.02.2006 --- Show
Trojan.DownLoader.2971 16.02.2006 --- Show
Trojan.Isbar.369 16.02.2006 --- Show
Trojan.DownLoader.4906 16.02.2006 --- Show
Trojan.DownLoader.4882 16.02.2006 --- Show
Trojan.DownLoader.4204 16.02.2006 --- Show
Trojan.Isbar.201 16.02.2006 --- Show
Trojan.Isbar.153 16.02.2006 --- Show
Trojan.Isbar.393 16.02.2006 --- Show
Trojan.Isbar.256 16.02.2006 --- Show
Trojan.Isbar.352 16.02.2006 --- Show
Trojan.Isbar.314 16.02.2006 --- Show
Trojan.Isbar.248 16.02.2006 --- Show
Trojan.Isbar.245 16.02.2006 --- Show
Trojan.DownLoader.3767 16.02.2006 --- Show
Trojan.DownLoader.2563 16.02.2006 --- Show
Trojan.DownLoader.2567 16.02.2006 --- Show
Trojan.DownLoader.2566 16.02.2006 --- Show
Trojan.DownLoader.1219 16.02.2006 --- Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.