Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

BackDoor.Bebloh in virus library:

A class of malware that can execute commands from a remote server and allow attackers to remotely control an infected device.

BackDoor.Bebloh in virus library:

BackDoor.Bebloh.1
BackDoor.Bebloh.10
BackDoor.Bebloh.108
BackDoor.Bebloh.109
BackDoor.Bebloh.11
BackDoor.Bebloh.110
BackDoor.Bebloh.111
BackDoor.Bebloh.112
BackDoor.Bebloh.12
BackDoor.Bebloh.122
BackDoor.Bebloh.124
BackDoor.Bebloh.125
BackDoor.Bebloh.13
BackDoor.Bebloh.131
BackDoor.Bebloh.136
BackDoor.Bebloh.148
BackDoor.Bebloh.163
BackDoor.Bebloh.164
BackDoor.Bebloh.165
BackDoor.Bebloh.167
BackDoor.Bebloh.169
BackDoor.Bebloh.17
BackDoor.Bebloh.170
BackDoor.Bebloh.171
BackDoor.Bebloh.172
BackDoor.Bebloh.173
BackDoor.Bebloh.174
BackDoor.Bebloh.175
BackDoor.Bebloh.176
BackDoor.Bebloh.18
BackDoor.Bebloh.181
BackDoor.Bebloh.183
BackDoor.Bebloh.185
BackDoor.Bebloh.186
BackDoor.Bebloh.187
BackDoor.Bebloh.19
BackDoor.Bebloh.192
BackDoor.Bebloh.193
BackDoor.Bebloh.199
BackDoor.Bebloh.2
BackDoor.Bebloh.20
BackDoor.Bebloh.203
BackDoor.Bebloh.205
BackDoor.Bebloh.209
BackDoor.Bebloh.21
BackDoor.Bebloh.211
BackDoor.Bebloh.212
BackDoor.Bebloh.213
BackDoor.Bebloh.215
BackDoor.Bebloh.216

1 2 3

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.