Library
My library

Add to library

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
BlackJec.231 16.02.2006 --- Show
BlackJec.281 16.02.2006 --- Show
BlackJec.272 16.02.2006 --- Show
BlackJec.246 16.02.2006 --- Show
BlackJec.236 16.02.2006 --- Show
BlackJec.230 16.02.2006 --- Show
BlackJec.284 16.02.2006 --- Show
BlackJec.252 16.02.2006 --- Show
BlackJec.235 16.02.2006 --- Show
BlackJec.232 16.02.2006 --- Show
BlackJec.307 16.02.2006 --- Show
Blink.501 16.02.2006 --- Show
Blind.549 16.02.2006 --- Show
Int13h.Blind.346 16.02.2006 --- Show
Trivial.284 16.02.2006 --- Show
Blava.787 16.02.2006 --- Show
Blah.3385 16.02.2006 --- Show
Blah.3379 16.02.2006 --- Show
Stuff.625 16.02.2006 --- Show
Trojan.Blya 16.02.2006 --- Show
BW.BladeRunner 16.02.2006 --- Show
BlackSun 16.02.2006 --- Show
BlackSun.2372 16.02.2006 --- Show
BlackIce.1930 16.02.2006 --- Show
Trojan.BlackHack.2641 16.02.2006 --- Show
Trojan.BlackHack.2681 16.02.2006 --- Show
BlackWorm 16.02.2006 --- Show
Legs.2278 16.02.2006 --- Show
BlackMonday.928 16.02.2006 --- Show
BlackMonday.1055 16.02.2006 --- Show
BlackMonday.781 16.02.2006 --- Show
Dnr.397 16.02.2006 --- Show
Dnr.331 16.02.2006 --- Show
BlackMonday.dropper.1055 16.02.2006 --- Show
BlackLotus.2390 16.02.2006 --- Show
BlackLotus.2407 16.02.2006 --- Show
BlackDaddy.1321 16.02.2006 --- Show
Integrator.1303 16.02.2006 --- Show
BlackAdder.1015 16.02.2006 --- Show
Bjk.2814 16.02.2006 --- Show
BzZ.714 16.02.2006 --- Show
BzZ.289 16.02.2006 --- Show
BzZ.288 16.02.2006 --- Show
Bizarre.2716 16.02.2006 --- Show
BitAddict.979 16.02.2006 --- Show
BitAddict.962 16.02.2006 --- Show
BitAddict.512 16.02.2006 --- Show
BitAddict.dropper.512 16.02.2006 --- Show
BitAddict.477 16.02.2006 --- Show
BitAddict.356 16.02.2006 --- Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.