Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

New Malware.u aliases:

Name Vendor Dr.Web classification name
New Malware.u McAfee BackDoor.Huai.1276
New Malware.u McAfee BackDoor.Huai.1318
New Malware.u McAfee BackDoor.Huai.1300
New Malware.u McAfee BackDoor.Huai.1320
New Malware.u McAfee BackDoor.Huai.1186
New Malware.u McAfee BackDoor.Huai.1245
New Malware.u McAfee BackDoor.Huai.1374
New Malware.u McAfee BackDoor.Beizhu.483
New Malware.u McAfee BackDoor.Beizhu.479
New Malware.u McAfee BackDoor.BlackHole.2074
New Malware.u McAfee BackDoor.Beizhu.480
New Malware.u McAfee BackDoor.Pigeon.7243
New Malware.u McAfee BackDoor.Pigeon.6360
New Malware.u McAfee BackDoor.Pigeon.8491
New Malware.u McAfee BackDoor.Huai.1294
New Malware.u McAfee BackDoor.Huai.1291
New Malware.u McAfee BackDoor.Huai.1204
New Malware.u McAfee BackDoor.Huai.1317
New Malware.u McAfee BackDoor.Huai.1299
New Malware.u McAfee BackDoor.Huai.1287
New Malware.u McAfee BackDoor.Huai.1214
New Malware.u McAfee BackDoor.Huai.1290
New Malware.u McAfee BackDoor.Huai.1233
New Malware.u McAfee BackDoor.Pigeon.11702
New Malware.u McAfee Trojan.DownLoader.42389
New Malware.u McAfee BackDoor.Ddoser
New Malware.u McAfee BackDoor.Pigeon.3859
New Malware.u McAfee BackDoor.Pigeon.3860
New Malware.u McAfee BackDoor.Pigeon.3920
New Malware.u McAfee BackDoor.Pigeon.3750
New Malware.u McAfee BackDoor.Pigeon.1249
New Malware.u McAfee BackDoor.Rejoice.129
New Malware.u McAfee BackDoor.Pigeon.2152
New Malware.u McAfee BackDoor.Huai.1074
New Malware.u McAfee BackDoor.Pigeon.5373
New Malware.u McAfee BackDoor.Pigeon.6176
New Malware.u McAfee BackDoor.Pigeon.2303
New Malware.u McAfee BackDoor.Pigeon.1256
New Malware.u McAfee BackDoor.Pigeon.3739
New Malware.u McAfee BackDoor.Pigeon.3879
New Malware.u McAfee BackDoor.Pigeon.7351
New Malware.u McAfee BackDoor.Pigeon.5546
New Malware.u McAfee BackDoor.Pigeon.7462
New Malware.u McAfee BackDoor.Pigeon.1866
New Malware.u McAfee BackDoor.Pigeon.8576
New Malware.u McAfee BackDoor.Pigeon.7601
New Malware.u McAfee Trojan.DownLoader.42491
New Malware.u McAfee BackDoor.Pigeon.7798
New Malware.u McAfee BackDoor.Pigeon.7452
New Malware.u McAfee BackDoor.Pigeon.3027

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.