Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Linux aliases:

Name Vendor Dr.Web classification name
Linux Avira Elf.dropper.2647

Linux in virus library:

Linux.Siggen.3131
Linux.Siggen.3132
Linux.Siggen.3133
Linux.Siggen.3134
Linux.Siggen.3135
Linux.Siggen.3136
Linux.Siggen.3137
Linux.Siggen.3138
Linux.Siggen.3139
Linux.Siggen.314
Linux.Siggen.3140
Linux.Siggen.3141
Linux.Siggen.3142
Linux.Siggen.3143
Linux.Siggen.3144
Linux.Siggen.3145
Linux.Siggen.3146
Linux.Siggen.3147
Linux.Siggen.3148
Linux.Siggen.3149
Linux.Siggen.3150
Linux.Siggen.3151
Linux.Siggen.3152
Linux.Siggen.3153
Linux.Siggen.3154
Linux.Siggen.3155
Linux.Siggen.3156
Linux.Siggen.3157
Linux.Siggen.3158
Linux.Siggen.3159
Linux.Siggen.3160
Linux.Siggen.3161
Linux.Siggen.3162
Linux.Siggen.3163
Linux.Siggen.3164
Linux.Siggen.3165
Linux.Siggen.3166
Linux.Siggen.3167
Linux.Siggen.3168
Linux.Siggen.3169
Linux.Siggen.3170
Linux.Siggen.3171
Linux.Siggen.3172
Linux.Siggen.3173
Linux.Siggen.3174
Linux.Siggen.3177
Linux.Siggen.3178
Linux.Siggen.3179
Linux.Siggen.318
Linux.Siggen.3180

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.