Library
My library

Add to library

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Wit.1271 16.02.2006 --- Show
SillyRC.679 16.02.2006 --- Show
NoPM.494 16.02.2006 --- Show
Vlad.NoOne 16.02.2006 --- Show
Noon.1666 16.02.2006 --- Show
Noon.1163 16.02.2006 --- Show
Nki.3477 16.02.2006 --- Show
Nono.1510 16.02.2006 --- Show
NoMessage 16.02.2006 --- Show
Mort.421 16.02.2006 --- Show
Nomov.413 16.02.2006 --- Show
Trojan.Int19h 16.02.2006 --- Show
NoMercy.3200 16.02.2006 --- Show
NRLG.Nom.2513 16.02.2006 --- Show
Nomenklatura.1024 16.02.2006 --- Show
Nomad.888 16.02.2006 --- Show
Nomad.1241 16.02.2006 --- Show
Nomad.1354 16.02.2006 --- Show
Nomad.1350 16.02.2006 --- Show
Nomad.1022 16.02.2006 --- Show
Noker.4575 16.02.2006 --- Show
Noki.448 16.02.2006 --- Show
Stoned.Noint 16.02.2006 --- Show
Noiembrie.610 16.02.2006 --- Show
Ngkoen 16.02.2006 --- Show
NoGraph.784 16.02.2006 --- Show
HLLP.NoFace.4701 16.02.2006 --- Show
NoDBF.1000 16.02.2006 --- Show
Nocopy.3685 16.02.2006 --- Show
Nocopy.3695 16.02.2006 --- Show
Nobody.402 16.02.2006 --- Show
Nobody.393 16.02.2006 --- Show
EasyRider.2108 16.02.2006 --- Show
Nobody.374 16.02.2006 --- Show
Fall.358 16.02.2006 --- Show
Not.474 16.02.2006 --- Show
Kamchatka.1575 16.02.2006 --- Show
Kamchatka.1000 16.02.2006 --- Show
NoRemorse.1319 16.02.2006 --- Show
NoParty.519 16.02.2006 --- Show
NoHope.257 16.02.2006 --- Show
NoFrills.Dudley 16.02.2006 --- Show
NoFrills.950 16.02.2006 --- Show
NoFrills.843 16.02.2006 --- Show
NoFrills.835 16.02.2006 --- Show
NoFrills.823 16.02.2006 --- Show
NoFrills.815 16.02.2006 --- Show
NoFrills.813 16.02.2006 --- Show
NoFrills.1358 16.02.2006 --- Show
NoBock.440 16.02.2006 --- Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.