Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Proxy-FBSR aliases:

Name Vendor Dr.Web classification name
Proxy-FBSR McAfee Trojan.Proxy.57
Proxy-FBSR McAfee Trojan.Proxy.35
Proxy-FBSR McAfee Trojan.Igos
Proxy-FBSR McAfee Trojan.Proxy.28
Proxy-FBSR McAfee Trojan.Proxy.48
Proxy-FBSR McAfee Trojan.Proxy.98
Proxy-FBSR McAfee Trojan.Proxy.95
Proxy-FBSR McAfee Trojan.Proxy.246
Proxy-FBSR McAfee Trojan.Proxy.86
Proxy-FBSR McAfee Trojan.Proxy.311
Proxy-FBSR McAfee Trojan.Proxy.139
Proxy-FBSR McAfee Trojan.Proxy.128
Proxy-FBSR McAfee Trojan.Proxy.517
Proxy-FBSR McAfee Trojan.Proxy.393
Proxy-FBSR McAfee Trojan.Proxy.640
Proxy-FBSR McAfee BackDoor.IRC.Moto
Proxy-FBSR McAfee Win32.Detox.based
Proxy-FBSR McAfee Trojan.Proxy.124
Proxy-FBSR McAfee Trojan.Proxy.32
Proxy-FBSR McAfee Trojan.Proxy.56
Proxy-FBSR McAfee Trojan.Proxy.156
Proxy-FBSR McAfee Trojan.Proxy.73
Proxy-FBSR McAfee Trojan.Proxy.245
Proxy-FBSR McAfee Trojan.Proxy.137
Proxy-FBSR McAfee Trojan.Proxy.386
Proxy-FBSR McAfee Trojan.Proxy.396
Proxy-FBSR McAfee Trojan.Proxy.113
Proxy-FBSR McAfee Trojan.Proxy.84
Proxy-FBSR McAfee BackDoor.DarkMoon.66
Proxy-FBSR McAfee Trojan.Proxy
Proxy-FBSR McAfee Trojan.Proxy.42
Proxy-FBSR McAfee Trojan.Proxy.491
Proxy-FBSR McAfee Trojan.Proxy.420
Proxy-FBSR McAfee Trojan.Proxy.445
Proxy-FBSR McAfee Trojan.Proxy.455
Proxy-FBSR McAfee Trojan.Proxy.129
Proxy-FBSR McAfee Trojan.Proxy.283
Proxy-FBSR McAfee Trojan.Proxy.519
Proxy-FBSR McAfee Trojan.Proxy.572
Proxy-FBSR McAfee Trojan.Proxy.623
Proxy-FBSR McAfee Trojan.Proxy.625
Proxy-FBSR McAfee Trojan.Proxy.247
Proxy-FBSR McAfee Trojan.Proxy.83
Proxy-FBSR McAfee Trojan.Proxy.381
Proxy-FBSR McAfee Trojan.MulDrop.2865
Proxy-FBSR McAfee Trojan.MulDrop.2864
Proxy-FBSR McAfee Trojan.MulDrop.2866
Proxy-FBSR McAfee Trojan.Proxy.371
Proxy-FBSR McAfee Trojan.Proxy.387
Proxy-FBSR McAfee Trojan.Proxy.397

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.