Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Win32/Bagle.Variant!Worm aliases:

Name Vendor Dr.Web classification name
Win32/Bagle.Variant!Worm Computer Associates Trojan.Proxy.67
Win32/Bagle.Variant!Worm Computer Associates Trojan.Proxy.114
Win32/Bagle.Variant!Worm Computer Associates Win32.HLLM.Postcard
Win32/Bagle.Variant!Worm Computer Associates Win32.HLLM.Beagle.45056
Win32/Bagle.Variant!Worm Computer Associates Win32.HLLM.Beagle.22528
Win32/Bagle.Variant!Worm Computer Associates Win32.HLLM.Beagle.30208
Win32/Bagle.Variant!Worm Computer Associates Win32.HLLM.Beagle.47415
Win32/Bagle.Variant!Worm Computer Associates Win32.HLLM.Beagle.25088
Win32/Bagle.Variant!Worm Computer Associates Win32.HLLM.Beagle
Win32/Bagle.Variant!Worm Computer Associates Trojan.Proxy.50
Win32/Bagle.Variant!Worm Computer Associates Win32.HLLM.Netsky.based
Win32/Bagle.Variant!Worm Computer Associates Win32.HLLM.Beagle.31232
Win32/Bagle.Variant!Worm Computer Associates Win32.HLLM.Beagle.19968
Win32/Bagle.Variant!Worm Computer Associates Trojan.Proxy
Win32/Bagle.Variant!Worm Computer Associates Trojan.Mitglied
Win32/Bagle.Variant!Worm Computer Associates Trojan.MailSpam
Win32/Bagle.Variant!Worm Computer Associates Win32.HLLM.Beagle.32768
Win32/Bagle.Variant!Worm Computer Associates Win32.HLLM.Beagle.based
Win32/Bagle.Variant!Worm Computer Associates Trojan.BeagleProxy
Win32/Bagle.Variant!Worm Computer Associates Trojan.PWS.Vipgsm
Win32/Bagle.Variant!Worm E-Trust Win32.HLLM.Beagle.29696
Win32/Bagle.Variant!Worm E-Trust Win32.HLLM.Netsky.18350
Win32/Bagle.Variant!Worm E-Trust Win32.HLLM.Beagle.21294
Win32/Bagle.Variant!Worm E-Trust Win32.HLLM.Beagle

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.