Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Trojan.DownLoader47.9544 03:02:10 19.07.2024 Show
Trojan.DownLoader47.9519 03:02:10 19.07.2024 Show
Trojan.Siggen29.3234 03:02:10 19.07.2024 Show
Trojan.Inject5.6370 03:02:09 19.07.2024 Show
Trojan.SpyBot.1430 03:02:09 19.07.2024 Show
Trojan.Siggen29.3268 03:02:09 19.07.2024 Show
Trojan.Encoder.39318 03:02:09 19.07.2024 Show
Trojan.DownLoader45.174 03:02:09 19.07.2024 Show
Trojan.Siggen29.3269 03:02:09 19.07.2024 Show
Trojan.Siggen29.3444 03:02:09 19.07.2024 Show
Trojan.Siggen29.3299 03:02:09 19.07.2024 Show
Trojan.Siggen29.3512 03:02:08 19.07.2024 Show
Trojan.Siggen29.3495 03:02:08 19.07.2024 Show
Trojan.Siggen29.3254 03:02:08 19.07.2024 Show
Trojan.DownLoader47.9416 03:02:08 19.07.2024 Show
Trojan.Siggen29.3223 03:02:08 19.07.2024 Show
Trojan.Siggen29.3485 03:02:08 19.07.2024 Show
Trojan.MulDrop27.63416 03:02:08 19.07.2024 Show
Trojan.MulDrop27.63558 03:02:07 19.07.2024 Show
Trojan.Siggen.40354 03:02:07 19.07.2024 Show
Trojan.Siggen29.3300 03:02:07 19.07.2024 Show
Trojan.Encoder.39360 03:02:07 19.07.2024 Show
Trojan.Siggen29.3587 03:02:07 19.07.2024 Show
Trojan.DownLoader47.9479 03:02:07 19.07.2024 Show
Trojan.DownLoader47.9397 03:02:07 19.07.2024 Show
Trojan.Siggen29.3327 03:02:07 19.07.2024 Show
Trojan.DownLoader47.9616 03:02:07 19.07.2024 Show
Trojan.Siggen29.3331 03:02:07 19.07.2024 Show
Trojan.DownLoader47.9440 03:02:07 19.07.2024 Show
Trojan.DownLoader47.9529 03:02:06 19.07.2024 Show
Trojan.Encoder.39310 03:02:06 19.07.2024 Show
Trojan.MulDrop27.63533 03:02:06 19.07.2024 Show
Trojan.MulDrop27.63372 03:02:06 19.07.2024 Show
Trojan.Siggen29.3083 03:02:06 19.07.2024 Show
Trojan.Encoder.39288 03:02:05 19.07.2024 Show
Trojan.Siggen29.3457 03:02:05 19.07.2024 Show
Trojan.MulDrop27.63564 03:02:05 19.07.2024 Show
Trojan.Siggen29.3196 03:02:05 19.07.2024 Show
Trojan.DownLoader47.9497 03:02:05 19.07.2024 Show
Trojan.MulDrop27.63349 03:02:05 19.07.2024 Show
Trojan.Siggen29.3452 03:02:05 19.07.2024 Show
Trojan.Siggen29.3201 03:02:05 19.07.2024 Show
Trojan.MulDrop27.63346 03:02:05 19.07.2024 Show
Trojan.Siggen29.3463 03:02:05 19.07.2024 Show
Trojan.Encoder.39361 03:02:04 19.07.2024 Show
Trojan.Siggen29.3208 03:02:04 19.07.2024 Show
Trojan.DownLoader47.9408 03:02:04 19.07.2024 Show
Trojan.DownLoader47.9588 03:02:04 19.07.2024 Show
Trojan.Encoder.39332 03:02:04 19.07.2024 Show
Trojan.Siggen29.3357 03:02:04 19.07.2024 Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.