Library
My library

Add to library

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
XM.Zepast 16.02.2006 --- Show
XM.Yohimbe 16.02.2006 --- Show
XM.Lavista 16.02.2006 --- Show
XM.Dado 16.02.2006 --- Show
XM.Weit 16.02.2006 --- Show
XM.Uedasan 16.02.2006 --- Show
XM.Ultras 16.02.2006 --- Show
XM.Totaler 16.02.2006 --- Show
XM.Tjoro 16.02.2006 --- Show
XM.Spellcheck 16.02.2006 --- Show
XM.Soldier 16.02.2006 --- Show
XM.Sofa 16.02.2006 --- Show
XM.Fin 16.02.2006 --- Show
XM.Robocop 16.02.2006 --- Show
X97M.Robocop 16.02.2006 --- Show
X97M.Riots 16.02.2006 --- Show
XM.Pth 16.02.2006 --- Show
XM.Tstvr 16.02.2006 --- Show
XM.Ninja 16.02.2006 --- Show
X97M.Neg 16.02.2006 --- Show
XM.NoMercy 16.02.2006 --- Show
XM.Neg 16.02.2006 --- Show
XM.LMV 16.02.2006 --- Show
Trojan.LMV 16.02.2006 --- Show
W97M.Linda 16.02.2006 --- Show
XM.Tabej 16.02.2006 --- Show
X97M.Ramboo 16.02.2006 --- Show
XM.Legend 16.02.2006 --- Show
XM.Hit 16.02.2006 --- Show
XM.HideMod 16.02.2006 --- Show
Trojan.Format 16.02.2006 --- Show
X97M.Forecast 16.02.2006 --- Show
XM.Extras 16.02.2006 --- Show
XM.Emperor 16.02.2006 --- Show
X97M.Edure 16.02.2006 --- Show
X97M.Dreams 16.02.2006 --- Show
XM.Don 16.02.2006 --- Show
XM.Disaster 16.02.2006 --- Show
XM.Delta 16.02.2006 --- Show
X97M.Delini 16.02.2006 --- Show
XM.Compat 16.02.2006 --- Show
XM.Cauli 16.02.2006 --- Show
X97M.Beliers 16.02.2006 --- Show
X97M.Adn 16.02.2006 --- Show
X97M.Teign 16.02.2006 --- Show
X97M.Xif 16.02.2006 --- Show
X97M.Xal 16.02.2006 --- Show
X97M.VCX 16.02.2006 --- Show
X97M.Vapour 16.02.2006 --- Show
X97M.Slacker 16.02.2006 --- Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.