Library
My library

+ Add to library

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Trojan.MulDrop28.47863 03:00:42 04.12.2024 Show
Trojan.DownLoader47.55430 03:00:42 04.12.2024 Show
Trojan.DownLoader47.55467 03:00:41 04.12.2024 Show
Trojan.MulDrop28.47762 03:00:41 04.12.2024 Show
Trojan.MulDrop.1449.origin 03:00:41 04.12.2024 Show
Trojan.PWS.Siggen3.39146 03:00:41 04.12.2024 Show
Trojan.Siggen30.15791 03:00:41 04.12.2024 Show
Trojan.Siggen30.15725 03:00:41 04.12.2024 Show
Trojan.Tofsee.136 03:00:41 04.12.2024 Show
Trojan.MulDrop28.47801 03:00:41 04.12.2024 Show
Trojan.Siggen30.15938 03:00:41 04.12.2024 Show
Trojan.DownLoader47.55516 03:00:41 04.12.2024 Show
Trojan.Siggen30.16018 03:00:41 04.12.2024 Show
Trojan.DownLoader47.55494 03:00:41 04.12.2024 Show
Trojan.DownLoader47.55488 03:00:41 04.12.2024 Show
Trojan.Siggen30.15951 03:00:41 04.12.2024 Show
Trojan.Siggen30.15887 03:00:41 04.12.2024 Show
Trojan.Siggen30.15899 03:00:41 04.12.2024 Show
Trojan.Siggen30.16133 03:00:40 04.12.2024 Show
Trojan.DownLoader47.55435 03:00:40 04.12.2024 Show
Trojan.MulDrop28.47756 03:00:40 04.12.2024 Show
Trojan.Siggen30.15708 03:00:40 04.12.2024 Show
Trojan.DownLoader47.55466 03:00:40 04.12.2024 Show
Trojan.Siggen30.15871 03:00:40 04.12.2024 Show
Trojan.KillProc2.23902 03:00:40 04.12.2024 Show
Trojan.Siggen30.15706 03:00:40 04.12.2024 Show
Trojan.Encoder.41301 03:00:40 04.12.2024 Show
Trojan.DownLoader47.55517 03:00:40 04.12.2024 Show
Trojan.StartPage.27069 03:00:40 04.12.2024 Show
Trojan.Siggen30.15985 03:00:40 04.12.2024 Show
Trojan.DownLoader47.55530 03:00:40 04.12.2024 Show
Trojan.Siggen30.15921 03:00:40 04.12.2024 Show
Trojan.Siggen30.16039 03:00:39 04.12.2024 Show
Trojan.DownLoader47.55558 03:00:39 04.12.2024 Show
Trojan.Siggen30.15777 03:00:39 04.12.2024 Show
Trojan.DownLoader47.55552 03:00:39 04.12.2024 Show
Trojan.Inject5.12910 03:00:39 04.12.2024 Show
Trojan.Siggen30.16106 03:00:39 04.12.2024 Show
Trojan.Siggen30.15664 03:00:39 04.12.2024 Show
Trojan.DownLoad4.8932 03:00:38 04.12.2024 Show
Trojan.Inject5.12895 03:00:38 04.12.2024 Show
Trojan.DownLoader47.55575 03:00:38 04.12.2024 Show
Trojan.Siggen30.16146 03:00:38 04.12.2024 Show
Trojan.DownLoader47.55526 03:00:38 04.12.2024 Show
Trojan.Siggen30.15994 03:00:38 04.12.2024 Show
Trojan.FBNG.225 03:00:38 04.12.2024 Show
Trojan.DownLoader47.55441 03:00:38 04.12.2024 Show
Trojan.DownLoader47.55512 03:00:37 04.12.2024 Show
Trojan.Siggen2.58060 03:00:37 04.12.2024 Show
Trojan.Siggen30.15830 03:00:37 04.12.2024 Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.