Library
My library

Add to library

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Trivial.220 16.02.2006 --- Show
Trivial.649 16.02.2006 --- Show
Trivial.630 16.02.2006 --- Show
Hector.548 16.02.2006 --- Show
Tiny.66 16.02.2006 --- Show
SillyOR.177 16.02.2006 --- Show
SillyOR.147 16.02.2006 --- Show
SillyOR.131 16.02.2006 --- Show
SillyOR.119 16.02.2006 --- Show
Evc.161 16.02.2006 --- Show
Kitiara.288 16.02.2006 --- Show
Trivial.Djin.132 16.02.2006 --- Show
Companion.Dikshew.82 16.02.2006 --- Show
Trivial.NoHook.82 16.02.2006 --- Show
Trivial.NoHook.81 16.02.2006 --- Show
Trivial.NoHook.78 16.02.2006 --- Show
Trivial.NoHook.77 16.02.2006 --- Show
SillyOR.72 16.02.2006 --- Show
SillyOR.67 16.02.2006 --- Show
SillyOR.62 16.02.2006 --- Show
SillyOR.60 16.02.2006 --- Show
SillyOR.50 16.02.2006 --- Show
SillyOR.49 16.02.2006 --- Show
Trivial.NoHook.48 16.02.2006 --- Show
SillyOR.45 16.02.2006 --- Show
Feist.379 16.02.2006 --- Show
ExeHeader.360 16.02.2006 --- Show
Scorn.289 16.02.2006 --- Show
Trivial.Hacker.255 16.02.2006 --- Show
SillyOR.126 16.02.2006 --- Show
Trivial.Sst.239 16.02.2006 --- Show
Trivial.Nauru.521 16.02.2006 --- Show
HFR.702 16.02.2006 --- Show
Trivial.Gula.300 16.02.2006 --- Show
Trivial.Greed 16.02.2006 --- Show
Grog.500 16.02.2006 --- Show
Trivial.Emilia.214 16.02.2006 --- Show
Dre.756 16.02.2006 --- Show
Dre.192 16.02.2006 --- Show
Leprosy.797 16.02.2006 --- Show
Trivial.230 16.02.2006 --- Show
SillyO.666 16.02.2006 --- Show
Trivial.664 16.02.2006 --- Show
Dikshew.642 16.02.2006 --- Show
Mini.60 16.02.2006 --- Show
Companion.Dikshew.59 16.02.2006 --- Show
Mini.59 16.02.2006 --- Show
Dikshew.Fraud 16.02.2006 --- Show
SillyOR.46 16.02.2006 --- Show
Baby.377 16.02.2006 --- Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.