Library
My library

Add to library

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
BackDoor.BlueFire.36 16.02.2006 --- Show
BackDoor.BlueFire.1 16.02.2006 --- Show
BackDoor.BlueAdeptz.2 16.02.2006 --- Show
BackDoor.Blhouse 16.02.2006 --- Show
BackDoor.Blaireau.314 16.02.2006 --- Show
Trojan.PWS.Kpo 16.02.2006 --- Show
BackDoor.Generic.808 16.02.2006 --- Show
BackDoor.Core 16.02.2006 --- Show
BackDoor.Generic.804 16.02.2006 --- Show
BackDoor.BlackAngel.5 16.02.2006 --- Show
BackDoor.Biztro 16.02.2006 --- Show
BackDoor.BioNet.403 16.02.2006 --- Show
BackDoor.BioNet.312 16.02.2006 --- Show
BackDoor.BioNet.311 16.02.2006 --- Show
BackDoor.BioNet.310 16.02.2006 --- Show
BackDoor.BioNet.309 16.02.2006 --- Show
BackDoor.BioNet.308 16.02.2006 --- Show
BackDoor.BioNet.307 16.02.2006 --- Show
BackDoor.IRC.BioNet.10 16.02.2006 --- Show
BackDoor.BioNet.210 16.02.2006 --- Show
BackDoor.BioNet.9 16.02.2006 --- Show
BackDoor.BioNet.92 16.02.2006 --- Show
BackDoor.BioNet.317 16.02.2006 --- Show
BackDoor.BioNet.316 16.02.2006 --- Show
BackDoor.BioNet.313 16.02.2006 --- Show
BackDoor.Fehler 16.02.2006 --- Show
Trojan.MulDrop.2929 16.02.2006 --- Show
Trojan.MulDrop.981 16.02.2006 --- Show
BackDoor.Vgr 16.02.2006 --- Show
BackDoor.Beast.208 16.02.2006 --- Show
BackDoor.Bla 16.02.2006 --- Show
Trojan.PWS.Here 16.02.2006 --- Show
BackDoor.Beast.300 16.02.2006 --- Show
BackDoor.Noneto 16.02.2006 --- Show
BackDoor.Beast.210 16.02.2006 --- Show
BackDoor.Beast.209 16.02.2006 --- Show
BackDoor.Beast.205 16.02.2006 --- Show
BackDoor.Beast.202 16.02.2006 --- Show
BackDoor.Beast.201 16.02.2006 --- Show
BackDoor.Beast.200 16.02.2006 --- Show
BackDoor.Beast.206 16.02.2006 --- Show
Trojan.MulDrop.2984 16.02.2006 --- Show
BackDoor.BDirect.10 16.02.2006 --- Show
BackDoor.Bandito 16.02.2006 --- Show
BackDoor.Bandito.12 16.02.2006 --- Show
BackDoor.Bandito.11 16.02.2006 --- Show
Trojan.MulDrop.2799 16.02.2006 --- Show
Trojan.MulDrop.1537 16.02.2006 --- Show
Trojan.MulDrop.1753 16.02.2006 --- Show
Trojan.MulDrop.1797 16.02.2006 --- Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.