Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Mal_Naix-6 aliases:

Name Vendor Dr.Web classification name
Mal_Naix-6 Trend Micro Trojan.Proxy.3352
Mal_Naix-6 Trend Micro Trojan.Click.19256
Mal_Naix-6 Trend Micro Trojan.StartPage.1298
Mal_Naix-6 Trend Micro Trojan.DownLoader.6907
Mal_Naix-6 Trend Micro Adware.QQHelp
Mal_Naix-6 Trend Micro Trojan.MulDrop.3320
Mal_Naix-6 Trend Micro Adware.Sogou.450
Mal_Naix-6 Trend Micro Adware.Mirarbar
Mal_Naix-6 Trend Micro Adware.Caishow
Mal_Naix-6 Trend Micro Adware.Netw
Mal_Naix-6 Trend Micro Adware.Sogou.452
Mal_Naix-6 Trend Micro Adware.Sogou.451
Mal_Naix-6 Trend Micro Adware.Sogou.453
Mal_Naix-6 Trend Micro Adware.Sogou.437
Mal_Naix-6 Trend Micro Adware.YsBar
Mal_Naix-6 Trend Micro Adware.Hun
Mal_Naix-6 Trend Micro Adware.CFS
Mal_Naix-6 Trend Micro Trojan.Click.1295
Mal_Naix-6 Trend Micro Trojan.DownLoad.29929
Mal_Naix-6 Trend Micro Trojan.DownLoader.10801
Mal_Naix-6 Trend Micro Adware.FastSearch
Mal_Naix-6 Trend Micro Adware.Comet
Mal_Naix-6 Trend Micro Trojan.PWS.Banker.14298
Mal_Naix-6 Trend Micro Adware.Roogoo
Mal_Naix-6 Trend Micro Trojan.Rameh
Mal_Naix-6 Trend Micro Trojan.StartPage.317
Mal_Naix-6 Trend Micro Trojan.Fakealert.305
Mal_Naix-6 Trend Micro Trojan.DownLoader.598
Mal_Naix-6 Trend Micro Trojan.DownLoader.654
Mal_Naix-6 Trend Micro Trojan.DownLoader.37823
Mal_Naix-6 Trend Micro Trojan.DownLoader.38400
Mal_Naix-6 Trend Micro Adware.Borlander
Mal_Naix-6 Trend Micro Trojan.Popwin.701
Mal_Naix-6 Trend Micro Trojan.Popwin.688
Mal_Naix-6 Trend Micro Trojan.PWS.Banker.14303
Mal_Naix-6 Trend Micro Trojan.PWS.Rumpa
Mal_Naix-6 Trend Micro Adware.QuickLinks
Mal_Naix-6 Trend Micro Trojan.PWS.Banker.14315
Mal_Naix-6 Trend Micro Adware.Sogou.66
Mal_Naix-6 Trend Micro Adware.Bho.427
Mal_Naix-6 Trend Micro Adware.Hotbot
Mal_Naix-6 Trend Micro Adware.ClickSpring
Mal_Naix-6 Trend Micro Adware.Sogou.69
Mal_Naix-6 Trend Micro Adware.Cinmus.180
Mal_Naix-6 Trend Micro Adware.Cinmus.178
Mal_Naix-6 Trend Micro Adware.Hotbar
Mal_Naix-6 Trend Micro Adware.Sogou.68
Mal_Naix-6 Trend Micro Adware.Sohu
Mal_Naix-6 Trend Micro Trojan.Peflog.31
Mal_Naix-6 Trend Micro Adware.Admedia

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.