Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Mal_Naix-6 aliases:

Name Vendor Dr.Web classification name
Mal_Naix-6 Trend Micro Trojan.Click.26465
Mal_Naix-6 Trend Micro Trojan.MulDrop.6720
Mal_Naix-6 Trend Micro Trojan.Popuper.27185
Mal_Naix-6 Trend Micro Trojan.Popuper.27194
Mal_Naix-6 Trend Micro Trojan.Popuper.27135
Mal_Naix-6 Trend Micro Trojan.Popuper.27111
Mal_Naix-6 Trend Micro Adware.Sogou.75
Mal_Naix-6 Trend Micro Trojan.DownLoader.1129
Mal_Naix-6 Trend Micro Trojan.Peflog.12
Mal_Naix-6 Trend Micro Adware.Cinmus.2240
Mal_Naix-6 Trend Micro Adware.Sogou.635
Mal_Naix-6 Trend Micro Adware.Popuper.11
Mal_Naix-6 Trend Micro Adware.Sogou.634
Mal_Naix-6 Trend Micro Trojan.Click.1589
Mal_Naix-6 Trend Micro Adware.Cinmus.261
Mal_Naix-6 Trend Micro Trojan.Popuper.26268
Mal_Naix-6 Trend Micro Trojan.Popuper.26378
Mal_Naix-6 Trend Micro Trojan.Popuper.25452
Mal_Naix-6 Trend Micro Trojan.Click.19433
Mal_Naix-6 Trend Micro Trojan.DownLoad.2074
Mal_Naix-6 Trend Micro Trojan.Popuper
Mal_Naix-6 Trend Micro Adware.Sogou.637
Mal_Naix-6 Trend Micro Trojan.DownLoader.origin
Mal_Naix-6 Trend Micro Trojan.Click.25986
Mal_Naix-6 Trend Micro Trojan.Iespy.395
Mal_Naix-6 Trend Micro Trojan.DownLoader.52976
Mal_Naix-6 Trend Micro Adware.Baidu.394
Mal_Naix-6 Trend Micro Adware.Cinmus.277
Mal_Naix-6 Trend Micro Adware.Gogoing
Mal_Naix-6 Trend Micro Trojan.DownLoader.18299
Mal_Naix-6 Trend Micro Adware.Cinmus.2339
Mal_Naix-6 Trend Micro Trojan.PWS.Banker.466
Mal_Naix-6 Trend Micro Trojan.Popwin.786
Mal_Naix-6 Trend Micro Adware.Askyaya
Mal_Naix-6 Trend Micro Trojan.BrowseBan.6
Mal_Naix-6 Trend Micro Trojan.Isbar.359
Mal_Naix-6 Trend Micro Trojan.Click.4685
Mal_Naix-6 Trend Micro Trojan.MulDrop.7050
Mal_Naix-6 Trend Micro Trojan.Popwin.764
Mal_Naix-6 Trend Micro Adware.Cinmus.2205
Mal_Naix-6 Trend Micro Trojan.Popwin.612
Mal_Naix-6 Trend Micro Adware.Sogou.111
Mal_Naix-6 Trend Micro Trojan.Popwin.762
Mal_Naix-6 Trend Micro Trojan.Popwin.758
Mal_Naix-6 Trend Micro Adware.Cinmus.16244
Mal_Naix-6 Trend Micro Trojan.Fakealert.202
Mal_Naix-6 Trend Micro Trojan.DownLoader1.1321
Mal_Naix-6 Trend Micro Trojan.DownLoader1.648
Mal_Naix-6 Trend Micro Trojan.DownLoader1.314
Mal_Naix-6 Trend Micro Trojan.DownLoader1.50

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.