Library
My library

Add to library

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
FDOS.Hirr.25 16.02.2006 --- Show
Win32.HLLM.Fantast.25 16.02.2006 --- Show
Win32.HLLM.Hulud 16.02.2006 --- Show
Trojan.DownLoader.2022 16.02.2006 --- Show
Trojan.PWS.Melp 16.02.2006 --- Show
Trojan.MulDrop.1802 16.02.2006 --- Show
BackDoor.Agobot 16.02.2006 --- Show
Win32.HLLW.KMKY.24576 16.02.2006 --- Show
Trojan.KillFiles.43520 16.02.2006 --- Show
Trojan.Sporkeh 16.02.2006 --- Show
Nuke.Vai 16.02.2006 --- Show
Nuke.Portf 16.02.2006 --- Show
BackDoor.Idim 16.02.2006 --- Show
Win32.HLLO.Rozak.28672 16.02.2006 --- Show
Trojan.Zendown 16.02.2006 --- Show
BackDoor.Parasite 16.02.2006 --- Show
Exploit.IISnls 16.02.2006 --- Show
FDOS.Assault.10 16.02.2006 --- Show
IRC.Poison 16.02.2006 --- Show
Trojan.ZGet.5120 16.02.2006 --- Show
BackDoor.Xtcp.200 16.02.2006 --- Show
Adware.Midaddle 16.02.2006 --- Show
Win32.HLLW.Scooter 16.02.2006 --- Show
Trojan.Taptus 16.02.2006 --- Show
Nuke.WinNuke.56320 16.02.2006 --- Show
Trojan.KillFiles.454 16.02.2006 --- Show
Trojan.MulDrop.80 16.02.2006 --- Show
BackDoor.DSNX 16.02.2006 --- Show
Trojan.Whistler.49152 16.02.2006 --- Show
Trojan.Eraser.49152 16.02.2006 --- Show
Trojan.MulDrop.190 16.02.2006 --- Show
Trojan.Wel 16.02.2006 --- Show
BackDoor.KWM 16.02.2006 --- Show
BackDoor.Getoff 16.02.2006 --- Show
Nuke.Elite 16.02.2006 --- Show
Delikon.Generator.20 16.02.2006 --- Show
Trojan.XdocSpy 16.02.2006 --- Show
Trojan.Unkurm.22016 16.02.2006 --- Show
FDOS.Udp.20 16.02.2006 --- Show
Trojan.Zheng 16.02.2006 --- Show
Trojan.KillFiles.69 16.02.2006 --- Show
Trojan.Sysmate 16.02.2006 --- Show
Trojan.SysMail 16.02.2006 --- Show
Trojan.MulDrop.1929 16.02.2006 --- Show
Trojan.Sumo 16.02.2006 --- Show
Trojan.Spybi 16.02.2006 --- Show
Trojan.StartPage.790 16.02.2006 --- Show
Trojan.StartPage.882 16.02.2006 --- Show
Trojan.StartPage.681 16.02.2006 --- Show
Trojan.StartPage.677 16.02.2006 --- Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.