Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Linux aliases:

Name Vendor Dr.Web classification name
Linux Avira Elf.dropper.2647

Linux in virus library:

Linux.Siggen.3181
Linux.Siggen.3182
Linux.Siggen.3183
Linux.Siggen.3184
Linux.Siggen.3185
Linux.Siggen.3186
Linux.Siggen.3187
Linux.Siggen.3188
Linux.Siggen.3189
Linux.Siggen.319
Linux.Siggen.3190
Linux.Siggen.3191
Linux.Siggen.3192
Linux.Siggen.3193
Linux.Siggen.3194
Linux.Siggen.3195
Linux.Siggen.3196
Linux.Siggen.3197
Linux.Siggen.3198
Linux.Siggen.3199
Linux.Siggen.320
Linux.Siggen.3200
Linux.Siggen.3201
Linux.Siggen.3202
Linux.Siggen.3203
Linux.Siggen.3204
Linux.Siggen.3205
Linux.Siggen.3206
Linux.Siggen.3207
Linux.Siggen.3208
Linux.Siggen.3209
Linux.Siggen.321
Linux.Siggen.3210
Linux.Siggen.3211
Linux.Siggen.3212
Linux.Siggen.3213
Linux.Siggen.3214
Linux.Siggen.3215
Linux.Siggen.3216
Linux.Siggen.3217
Linux.Siggen.3218
Linux.Siggen.3219
Linux.Siggen.322
Linux.Siggen.3220
Linux.Siggen.3221
Linux.Siggen.3222
Linux.Siggen.3223
Linux.Siggen.3224
Linux.Siggen.3225
Linux.Siggen.3226

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.