Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

New Malware.u aliases:

Name Vendor Dr.Web classification name
New Malware.u McAfee BackDoor.Pigeon.8532
New Malware.u McAfee BackDoor.Pigeon.8590
New Malware.u McAfee BackDoor.Pigeon.8660
New Malware.u McAfee BackDoor.Pigeon.8785
New Malware.u McAfee BackDoor.Pigeon.8725
New Malware.u McAfee BackDoor.Pigeon.8699
New Malware.u McAfee BackDoor.Pigeon.8780
New Malware.u McAfee BackDoor.Pigeon.8505
New Malware.u McAfee BackDoor.Pigeon.8700
New Malware.u McAfee BackDoor.Pigeon.8603
New Malware.u McAfee BackDoor.Vport.15
New Malware.u McAfee BackDoor.Pigeon.8709
New Malware.u McAfee BackDoor.Pigeon.8729
New Malware.u McAfee BackDoor.Pigeon.11708
New Malware.u McAfee BackDoor.Pigeon.8605
New Malware.u McAfee BackDoor.Pigeon.8644
New Malware.u McAfee BackDoor.IRC.Sdbot.2143
New Malware.u McAfee BackDoor.Pigeon.8741
New Malware.u McAfee BackDoor.Pigeon.8506
New Malware.u McAfee BackDoor.Pigeon.8518
New Malware.u McAfee BackDoor.Pigeon.8507
New Malware.u McAfee BackDoor.Pigeon.8571
New Malware.u McAfee BackDoor.Pigeon.8588
New Malware.u McAfee BackDoor.Pigeon.8643
New Malware.u McAfee Trojan.MulDrop.14111
New Malware.u McAfee Trojan.DownLoader.59771
New Malware.u McAfee Tool.Xsniff
New Malware.u McAfee Tool.DialupPass
New Malware.u McAfee BackDoor.Foxde
New Malware.u McAfee BackDoor.Pigeon.5356
New Malware.u McAfee BackDoor.Pigeon.3765
New Malware.u McAfee Tool.PassView
New Malware.u McAfee BackDoor.BlackHole.2038
New Malware.u McAfee Trojan.PWS.Qqpass.1706
New Malware.u McAfee Trojan.DownLoader.5500
New Malware.u McAfee Trojan.Shua.142
New Malware.u McAfee Trojan.PWS.Qqpass.48
New Malware.u McAfee Trojan.PWS.Legmir.501
New Malware.u McAfee Trojan.DownLoader.5246
New Malware.u McAfee Trojan.PWS.Gamania.12527
New Malware.u McAfee Trojan.PWS.Bancos.207
New Malware.u McAfee BackDoor.Pigeon.11870
New Malware.u McAfee Trojan.Click.1757
New Malware.u McAfee Trojan.PWS.MSNSpy
New Malware.u McAfee Trojan.PWS.Legmir.812
New Malware.u McAfee Trojan.Inject.3418
New Malware.u McAfee Trojan.KeyLogger.2275
New Malware.u McAfee Trojan.KeyLogger.2278
New Malware.u McAfee BackDoor.Attacker.18
New Malware.u McAfee BackDoor.Pigeon.11852

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.