Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Mal_Naix-6 aliases:

Name Vendor Dr.Web classification name
Mal_Naix-6 Trend Micro Trojan.DownLoad1.41393
Mal_Naix-6 Trend Micro Trojan.DownLoad1.41919
Mal_Naix-6 Trend Micro Trojan.DownLoad1.37851
Mal_Naix-6 Trend Micro Trojan.DownLoad.3149
Mal_Naix-6 Trend Micro Trojan.DownLoader.53047
Mal_Naix-6 Trend Micro Adware.Cinmus.2228
Mal_Naix-6 Trend Micro Trojan.DownLoader.56188
Mal_Naix-6 Trend Micro Adware.Lucky
Mal_Naix-6 Trend Micro Trojan.Popwin.725
Mal_Naix-6 Trend Micro Adware.GloboSearch
Mal_Naix-6 Trend Micro Adware.F1Organizer
Mal_Naix-6 Trend Micro Trojan.SoftPush.10
Mal_Naix-6 Trend Micro Adware.Cinmus.2474
Mal_Naix-6 Trend Micro Adware.Cinmus.2481
Mal_Naix-6 Trend Micro Adware.Cinmus.2480
Mal_Naix-6 Trend Micro Adware.Cinmus.2416
Mal_Naix-6 Trend Micro Adware.TVMedia
Mal_Naix-6 Trend Micro Trojan.DownLoader.46465
Mal_Naix-6 Trend Micro Trojan.Popwin.817
Mal_Naix-6 Trend Micro Trojan.Popwin.813
Mal_Naix-6 Trend Micro BackDoor.Adbreak
Mal_Naix-6 Trend Micro Trojan.Apron.18
Mal_Naix-6 Trend Micro Trojan.BrowseBan.14
Mal_Naix-6 Trend Micro Trojan.MulDrop.2506
Mal_Naix-6 Trend Micro Adware.Cinmus.16081
Mal_Naix-6 Trend Micro Adware.Cinmus.16069
Mal_Naix-6 Trend Micro Adware.Cinmus.15945
Mal_Naix-6 Trend Micro Adware.Siggen.2897
Mal_Naix-6 Trend Micro Adware.Cinmus.15989
Mal_Naix-6 Trend Micro Adware.Cinmus.16008
Mal_Naix-6 Trend Micro Adware.Cinmus.16051
Mal_Naix-6 Trend Micro Adware.F1Organizer.15
Mal_Naix-6 Trend Micro Adware.Websearch.105
Mal_Naix-6 Trend Micro Adware.Ezula.167
Mal_Naix-6 Trend Micro Adware.Cinmus.15990
Mal_Naix-6 Trend Micro Adware.Cinmus.16074
Mal_Naix-6 Trend Micro Trojan.SoftPush.origin
Mal_Naix-6 Trend Micro Trojan.Click.26988
Mal_Naix-6 Trend Micro Trojan.StartPage.629
Mal_Naix-6 Trend Micro Trojan.Bispy
Mal_Naix-6 Trend Micro Trojan.Packed.158
Mal_Naix-6 Trend Micro Trojan.Webxman
Mal_Naix-6 Trend Micro Adware.Baigoo
Mal_Naix-6 Trend Micro Adware.Msm
Mal_Naix-6 Trend Micro Trojan.Perflog.30
Mal_Naix-6 Trend Micro Trojan.Popwin.717
Mal_Naix-6 Trend Micro Adware.Midaddle
Mal_Naix-6 Trend Micro Adware.Exact
Mal_Naix-6 Trend Micro Trojan.BrowseBan.35
Mal_Naix-6 Trend Micro Adware.Apsoft

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.