Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Android.Hidden.11985 07:29:21 26.04.2024 Show
Android.Hidden.11986 07:28:20 26.04.2024 Show
Android.Hidden.11984 07:10:56 26.04.2024 Show
Adware.Kyview.395 06:59:14 25.04.2024 Show
Linux.Siggen.7287 06:05:02 25.04.2024 Show
Trojan.Siggen28.35793 03:04:48 26.04.2024 Show
Trojan.Siggen28.35808 03:04:48 26.04.2024 Show
Trojan.Siggen28.35615 03:04:48 26.04.2024 Show
Trojan.MulDrop27.903 03:04:48 26.04.2024 Show
Trojan.Siggen28.35209 03:04:47 26.04.2024 Show
Trojan.Siggen28.35626 03:04:47 26.04.2024 Show
Exploit.Siggen3.49013 03:04:47 26.04.2024 Show
Trojan.Siggen28.35422 03:04:47 26.04.2024 Show
Trojan.Siggen28.35206 03:04:46 26.04.2024 Show
Trojan.Siggen28.35461 03:04:46 26.04.2024 Show
Win32.HLLW.Autoruner3.11756 03:04:46 26.04.2024 Show
Trojan.Siggen28.35707 03:04:46 26.04.2024 Show
Trojan.Siggen28.35705 03:04:46 26.04.2024 Show
Trojan.DownLoader46.60081 03:04:45 26.04.2024 Show
Trojan.MulDrop27.998 03:04:45 26.04.2024 Show
Trojan.Siggen28.35633 03:04:45 26.04.2024 Show
Trojan.Inject5.4458 03:04:45 26.04.2024 Show
Trojan.DownLoader46.60205 03:04:45 26.04.2024 Show
Trojan.MulDrop27.884 03:04:43 26.04.2024 Show
Trojan.PWS.Stealer.38786 03:04:43 26.04.2024 Show
Trojan.Siggen28.35438 03:04:43 26.04.2024 Show
Trojan.MulDrop27.814 03:04:42 26.04.2024 Show
Trojan.Siggen28.35485 03:04:42 26.04.2024 Show
Trojan.Siggen28.35351 03:04:42 26.04.2024 Show
Trojan.Siggen28.35400 03:04:42 26.04.2024 Show
Trojan.Siggen28.35433 03:04:42 26.04.2024 Show
Trojan.Siggen28.35452 03:04:41 26.04.2024 Show
Trojan.Siggen28.35262 03:04:41 26.04.2024 Show
Trojan.Siggen28.35620 03:04:40 26.04.2024 Show
Trojan.DownLoader46.60052 03:04:40 26.04.2024 Show
Trojan.Siggen28.35725 03:04:40 26.04.2024 Show
Trojan.MulDrop27.823 03:04:40 26.04.2024 Show
Trojan.Siggen28.35819 03:04:40 26.04.2024 Show
Trojan.DnsChange.17684 03:04:39 26.04.2024 Show
Trojan.MulDrop27.925 03:04:39 26.04.2024 Show
Trojan.Siggen28.35386 03:04:39 26.04.2024 Show
Trojan.Siggen28.35810 03:04:39 26.04.2024 Show
Trojan.Siggen28.36068 03:04:38 26.04.2024 Show
Trojan.Siggen28.35475 03:04:38 26.04.2024 Show
Trojan.Siggen28.35259 03:04:38 26.04.2024 Show
Trojan.Siggen28.35818 03:04:38 26.04.2024 Show
Trojan.Siggen28.35729 03:04:37 26.04.2024 Show
Trojan.Siggen28.35534 03:04:37 26.04.2024 Show
Trojan.Siggen28.35646 03:04:37 26.04.2024 Show
Trojan.DownLoader46.60102 03:04:37 26.04.2024 Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.