Library
My library

Add to library

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
NuKE.Pox.1805 16.02.2006 --- Show
NuKE.Pox.611 16.02.2006 --- Show
NuKE.Pox.1683 16.02.2006 --- Show
NuKE.Pox.1686 16.02.2006 --- Show
Uklott.1327 16.02.2006 --- Show
Wra.1000 16.02.2006 --- Show
BigMouse.900 16.02.2006 --- Show
November17.880 16.02.2006 --- Show
November17.864 16.02.2006 --- Show
November17.800 16.02.2006 --- Show
November17.768 16.02.2006 --- Show
November17.706 16.02.2006 --- Show
November17.690 16.02.2006 --- Show
November17.584 16.02.2006 --- Show
November17.522 16.02.2006 --- Show
November17.1061 16.02.2006 --- Show
November17.855 16.02.2006 --- Show
Yosha.275 16.02.2006 --- Show
Not.586 16.02.2006 --- Show
Not.574 16.02.2006 --- Show
Int13h.Michel.679 16.02.2006 --- Show
SGWW.Nostardamus.5995 16.02.2006 --- Show
SGWW.Nostardamus.5999 16.02.2006 --- Show
SGWW.Nostardamus.2500 16.02.2006 --- Show
SGWW.Nostardamus.2560 16.02.2006 --- Show
SGWW.Nostardamus.2306 16.02.2006 --- Show
SGWW.Nostardamus.2308 16.02.2006 --- Show
SGWW.Nostardamus.2222 16.02.2006 --- Show
SGWW.Nostardamus.2147 16.02.2006 --- Show
SGWW.Nostardamus.2255 16.02.2006 --- Show
SGWW.Nostardamus.2190 16.02.2006 --- Show
SGWW.Nostardamus.2188 16.02.2006 --- Show
SGWW.Nostardamus.2247 16.02.2006 --- Show
SGWW.Nostardamus.1870 16.02.2006 --- Show
VCL.411 16.02.2006 --- Show
VCL.Nosnam.409 16.02.2006 --- Show
Norge.673 16.02.2006 --- Show
Wit.958 16.02.2006 --- Show
Wit.955 16.02.2006 --- Show
Wit.905 16.02.2006 --- Show
Wit.910 16.02.2006 --- Show
Wit.691 16.02.2006 --- Show
Wit.617 16.02.2006 --- Show
Wit.614 16.02.2006 --- Show
Wit.592 16.02.2006 --- Show
Wit.555 16.02.2006 --- Show
Wit.1326 16.02.2006 --- Show
Wit.1322 16.02.2006 --- Show
Wit.1278 16.02.2006 --- Show
Wit.1272 16.02.2006 --- Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.