Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

New Malware.h aliases:

Name Vendor Dr.Web classification name
New Malware.h McAfee BackDoor.Servu.60
New Malware.h McAfee Win32.Virut.5131
New Malware.h McAfee Win32.Opasoft
New Malware.h McAfee Trojan.DownLoader.51934
New Malware.h McAfee Trojan.MulDrop.8024
New Malware.h McAfee BackDoor.IRC.Fearbot
New Malware.h McAfee BackDoor.Amitist.13
New Malware.h McAfee Tool.Netcat
New Malware.h McAfee BackDoor.Optix.168
New Malware.h McAfee Trojan.MulDrop.6376
New Malware.h McAfee Trojan.MulDrop.6375
New Malware.h McAfee Nuke.Sphere
New Malware.h McAfee Trojan.Inject.1972
New Malware.h McAfee Trojan.DownLoader.1109
New Malware.h McAfee Trojan.ProAgent.20
New Malware.h McAfee Trojan.MulDrop.7882
New Malware.h McAfee BackDoor.Pigeon.2717
New Malware.h McAfee Program.ServUServer.5214
New Malware.h McAfee BackDoor.HackDef.545
New Malware.h McAfee Trojan.DownLoader.1241
New Malware.h McAfee Tool.MessenPass
New Malware.h McAfee Tool.PassView
New Malware.h McAfee Trojan.DownLoader.58125
New Malware.h McAfee Trojan.DownLoader.27716
New Malware.h McAfee Trojan.Inject.3299
New Malware.h McAfee Trojan.Inject.3239
New Malware.h McAfee Trojan.DownLoader.59536
New Malware.h McAfee Trojan.MulDrop.10608
New Malware.h McAfee BackDoor.Pigeon.13074
New Malware.h McAfee Trojan.DownLoader.33693
New Malware.h McAfee BackDoor.HackDef.538
New Malware.h McAfee Trojan.PWS.Maran.318
New Malware.h McAfee BackDoor.IRC.Sdbot.3192
New Malware.h McAfee Trojan.Click.4767
New Malware.h McAfee Trojan.Fakealert.317
New Malware.h McAfee BackDoor.IRC.Sxbot
New Malware.h McAfee Trojan.MulDrop.2450
New Malware.h McAfee Win32.Lsabot
New Malware.h McAfee BackDoor.BotNet.49
New Malware.h McAfee Tool.xCmd
New Malware.h McAfee BackDoor.Vgsvk
New Malware.h McAfee BackDoor.ColdFusion.11
New Malware.h McAfee Trojan.AVKill.57
New Malware.h McAfee BackDoor.Servu.25
New Malware.h McAfee Trojan.AFX
New Malware.h McAfee BackDoor.Pigeon.6374
New Malware.h McAfee Trojan.DownLoader.44511
New Malware.h McAfee BackDoor.Pigeon.7468
New Malware.h McAfee BackDoor.Pigeon.2254
New Malware.h McAfee BackDoor.PSClient

1 2 3 4 5 6 7 8 9 10 11 12

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.