Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Mal_Naix-6 aliases:

Name Vendor Dr.Web classification name
Mal_Naix-6 Trend Micro Trojan.DownLoader1.428
Mal_Naix-6 Trend Micro Adware.Plugin
Mal_Naix-6 Trend Micro Trojan.DownLoader.46461
Mal_Naix-6 Trend Micro Trojan.PWS.IEPass
Mal_Naix-6 Trend Micro Dialer.Maxd
Mal_Naix-6 Trend Micro Program.InvKeylog
Mal_Naix-6 Trend Micro Trojan.Ugly.29362
Mal_Naix-6 Trend Micro Trojan.Dyfuca
Mal_Naix-6 Trend Micro Trojan.Popwin.809
Mal_Naix-6 Trend Micro Adware.MyToolBar
Mal_Naix-6 Trend Micro Adware.IWantSearch
Mal_Naix-6 Trend Micro Adware.Ezula
Mal_Naix-6 Trend Micro Trojan.Click.728
Mal_Naix-6 Trend Micro Trojan.DownLoader.53048
Mal_Naix-6 Trend Micro Trojan.Click.27348
Mal_Naix-6 Trend Micro Adware.Cinmus.386
Mal_Naix-6 Trend Micro Adware.Kaboom
Mal_Naix-6 Trend Micro Adware.Alexa
Mal_Naix-6 Trend Micro Trojan.Popwin.810
Mal_Naix-6 Trend Micro Adware.Cinmus.392
Mal_Naix-6 Trend Micro Adware.Solutions
Mal_Naix-6 Trend Micro Trojan.Click.1149
Mal_Naix-6 Trend Micro Adware.Ieprom
Mal_Naix-6 Trend Micro Trojan.Popwin.761
Mal_Naix-6 Trend Micro Trojan.Popwin.729
Mal_Naix-6 Trend Micro Trojan.Popwin.757
Mal_Naix-6 Trend Micro Trojan.Click.19204
Mal_Naix-6 Trend Micro Adware.Cinmus.2467
Mal_Naix-6 Trend Micro Trojan.DownLoader.55464
Mal_Naix-6 Trend Micro Adware.Bho
Mal_Naix-6 Trend Micro Adware.Xiao
Mal_Naix-6 Trend Micro Trojan.Iespy
Mal_Naix-6 Trend Micro Trojan.Cfs
Mal_Naix-6 Trend Micro Trojan.DownLoader.9690
Mal_Naix-6 Trend Micro Adware.Cinmus.2326
Mal_Naix-6 Trend Micro Adware.Cinmus.2328
Mal_Naix-6 Trend Micro Trojan.Popwin.1499
Mal_Naix-6 Trend Micro Trojan.Dyfuca.112
Mal_Naix-6 Trend Micro Trojan.Popwin.1459
Mal_Naix-6 Trend Micro Trojan.Popwin.1504
Mal_Naix-6 Trend Micro Adware.Cinmus.15908
Mal_Naix-6 Trend Micro Adware.Cinmus.15903
Mal_Naix-6 Trend Micro Adware.Cinmus.15907
Mal_Naix-6 Trend Micro Trojan.Popwin.1490
Mal_Naix-6 Trend Micro Trojan.Popwin.1553
Mal_Naix-6 Trend Micro Trojan.Popwin.1463
Mal_Naix-6 Trend Micro Adware.Cinmus.15915
Mal_Naix-6 Trend Micro Adware.Benega.921
Mal_Naix-6 Trend Micro Trojan.Popwin.1585
Mal_Naix-6 Trend Micro Adware.Cinmus.17212

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.