Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Trojan.Siggen28.36156 03:03:58 27.04.2024 Show
Trojan.Siggen28.36081 03:03:57 27.04.2024 Show
Trojan.DownLoader46.60521 03:03:57 27.04.2024 Show
Trojan.MulDrop27.1483 03:03:57 27.04.2024 Show
Trojan.Siggen28.36628 03:03:57 27.04.2024 Show
Trojan.Siggen28.36619 03:03:57 27.04.2024 Show
Trojan.Siggen28.35983 03:03:57 27.04.2024 Show
Trojan.Siggen28.36489 03:03:56 27.04.2024 Show
Trojan.Siggen28.36871 03:03:56 27.04.2024 Show
Trojan.Siggen28.36392 03:03:56 27.04.2024 Show
Trojan.Siggen28.36425 03:03:56 27.04.2024 Show
Trojan.Siggen28.36097 03:03:56 27.04.2024 Show
Trojan.Siggen28.36825 03:03:56 27.04.2024 Show
Trojan.DownLoader46.60241 03:03:56 27.04.2024 Show
Trojan.MulDrop27.1004 03:03:55 27.04.2024 Show
Trojan.DownLoader46.60235 03:03:55 27.04.2024 Show
Trojan.Siggen28.36609 03:03:55 27.04.2024 Show
Trojan.Inject5.4500 03:03:55 27.04.2024 Show
Trojan.Siggen28.36697 03:03:54 27.04.2024 Show
Trojan.Siggen28.35988 03:03:54 27.04.2024 Show
Trojan.Siggen28.36472 03:03:54 27.04.2024 Show
Trojan.MulDrop27.1350 03:03:54 27.04.2024 Show
Trojan.MulDrop27.1423 03:03:54 27.04.2024 Show
Trojan.MulDrop27.1752 03:03:54 27.04.2024 Show
Trojan.Siggen28.35865 03:03:54 27.04.2024 Show
Trojan.Siggen28.36041 03:03:53 27.04.2024 Show
Trojan.Siggen28.36369 03:03:53 27.04.2024 Show
Trojan.Siggen28.36503 03:03:53 27.04.2024 Show
Trojan.Siggen28.36386 03:03:53 27.04.2024 Show
Trojan.Siggen28.36696 03:03:52 27.04.2024 Show
Trojan.Inject5.4479 03:03:52 27.04.2024 Show
Trojan.DownLoader46.60331 03:03:52 27.04.2024 Show
Trojan.DownLoader46.60423 03:03:52 27.04.2024 Show
Trojan.MulDrop27.1274 03:03:52 27.04.2024 Show
Trojan.MulDrop27.1192 03:03:51 27.04.2024 Show
Trojan.DownLoader46.60358 03:03:51 27.04.2024 Show
Trojan.Siggen28.36385 03:03:50 27.04.2024 Show
Trojan.MulDrop27.1404 03:03:50 27.04.2024 Show
Trojan.Siggen28.36203 03:03:49 27.04.2024 Show
Trojan.DownLoader46.60255 03:03:49 27.04.2024 Show
Trojan.MulDrop27.1416 03:03:49 27.04.2024 Show
Trojan.DownLoader46.60361 03:03:49 27.04.2024 Show
Trojan.Siggen28.36362 03:03:49 27.04.2024 Show
Trojan.Siggen28.36572 03:03:49 27.04.2024 Show
Trojan.DownLoader46.60359 03:03:49 27.04.2024 Show
Trojan.Siggen28.36487 03:03:49 27.04.2024 Show
Trojan.MulDrop27.1456 03:03:49 27.04.2024 Show
Trojan.DownLoader46.60312 03:03:49 27.04.2024 Show
Trojan.DownLoader46.60392 03:03:48 27.04.2024 Show
Trojan.Siggen28.36521 03:03:48 27.04.2024 Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.