Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Mal_Naix-6 aliases:

Name Vendor Dr.Web classification name
Mal_Naix-6 Trend Micro Adware.Cinmus.149
Mal_Naix-6 Trend Micro Adware.Cinmus.146
Mal_Naix-6 Trend Micro Adware.Cinmus.152
Mal_Naix-6 Trend Micro Adware.Cinmus.151
Mal_Naix-6 Trend Micro Adware.Cinmus.150
Mal_Naix-6 Trend Micro Adware.Cinmus.138
Mal_Naix-6 Trend Micro Adware.Cinmus.137
Mal_Naix-6 Trend Micro Trojan.PWS.School
Mal_Naix-6 Trend Micro Adware.Cdn
Mal_Naix-6 Trend Micro Adware.Cinmus.133
Mal_Naix-6 Trend Micro Trojan.PWS.Helper.3
Mal_Naix-6 Trend Micro Adware.SearchAid
Mal_Naix-6 Trend Micro Adware.BargainBuddy
Mal_Naix-6 Trend Micro Adware.Cinmus.117
Mal_Naix-6 Trend Micro Adware.Zango
Mal_Naix-6 Trend Micro Adware.Cinmus
Mal_Naix-6 Trend Micro Adware.Sogou
Mal_Naix-6 Trend Micro Adware.Cinmus.119
Mal_Naix-6 Trend Micro Adware.Cinmus.129
Mal_Naix-6 Trend Micro Adware.Cinmus.115
Mal_Naix-6 Trend Micro Adware.Cinmus.128
Mal_Naix-6 Trend Micro Adware.Cinmus.122
Mal_Naix-6 Trend Micro Adware.Cinmus.123
Mal_Naix-6 Trend Micro Adware.Allsum
Mal_Naix-6 Trend Micro Adware.Cinmus.126
Mal_Naix-6 Trend Micro Trojan.PWS.Banker.6530
Mal_Naix-6 Trend Micro Trojan.BrowseBan.36
Mal_Naix-6 Trend Micro Trojan.PWS.Banker.6516
Mal_Naix-6 Trend Micro Adware.Cinmus.121
Mal_Naix-6 Trend Micro Adware.Cinmus.116
Mal_Naix-6 Trend Micro Trojan.Peflog.160
Mal_Naix-6 Trend Micro Adware.Cinmus.132
Mal_Naix-6 Trend Micro Adware.Sienna
Mal_Naix-6 Trend Micro Adware.Baidu.281
Mal_Naix-6 Trend Micro Adware.Cinmus.141
Mal_Naix-6 Trend Micro Adware.Cinmus.131
Mal_Naix-6 Trend Micro Adware.Cinmus.135
Mal_Naix-6 Trend Micro Adware.Cinmus.142
Mal_Naix-6 Trend Micro Trojan.Popwin
Mal_Naix-6 Trend Micro Trojan.Click.3610
Mal_Naix-6 Trend Micro Adware.Ncast
Mal_Naix-6 Trend Micro Trojan.DownLoader.28799
Mal_Naix-6 Trend Micro Trojan.Ugly.29365
Mal_Naix-6 Trend Micro Trojan.DownLoader.31128
Mal_Naix-6 Trend Micro Trojan.Iespy.464
Mal_Naix-6 Trend Micro Trojan.Click.18708
Mal_Naix-6 Trend Micro Adware.Cinmus.109
Mal_Naix-6 Trend Micro Adware.SideFind
Mal_Naix-6 Trend Micro Trojan.Click.27368
Mal_Naix-6 Trend Micro Trojan.DownLoader.3136

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.