FOR CUSTOMERS

Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Trojan.Nosecur 17.02.2006 --- Show
Trojan.Notask 17.02.2006 --- Show
Trojan.Nrop 17.02.2006 --- Show
Trojan.NtRootKit.47 17.02.2006 --- Show
Trojan.NtRootKit.58 17.02.2006 --- Show
Trojan.Nuke 17.02.2006 --- Show
Trojan.Offun 17.02.2006 --- Show
Trojan.Oleg 17.02.2006 --- Show
Trojan.Omicron.4 17.02.2006 --- Show
Trojan.Overture 17.02.2006 --- Show
Trojan.Paranote 17.02.2006 --- Show
Trojan.Parkin 17.02.2006 --- Show
Trojan.Pbpac 17.02.2006 --- Show
Trojan.Peflog.12 17.02.2006 --- Show
Trojan.Peflog.41 17.02.2006 --- Show
Trojan.Peun 17.02.2006 --- Show
Trojan.Picture 17.02.2006 --- Show
Trojan.Polo 17.02.2006 --- Show
Trojan.Popups 17.02.2006 --- Show
Trojan.Predator 17.02.2006 --- Show
Trojan.ProAgent.20 17.02.2006 --- Show
Trojan.Projin 17.02.2006 --- Show
Trojan.Prosiak 17.02.2006 --- Show
Trojan.Proxy.105 17.02.2006 --- Show
Trojan.Proxy.106 17.02.2006 --- Show
Trojan.Proxy.113 17.02.2006 --- Show
Trojan.Proxy.115 17.02.2006 --- Show
Trojan.Proxy.120 17.02.2006 --- Show
Trojan.Proxy.133 17.02.2006 --- Show
Trojan.Proxy.140 17.02.2006 --- Show
Trojan.Proxy.143 17.02.2006 --- Show
Trojan.Proxy.146 17.02.2006 --- Show
Trojan.Proxy.149 17.02.2006 --- Show
Trojan.Proxy.162 17.02.2006 --- Show
Trojan.Proxy.170 17.02.2006 --- Show
Trojan.Proxy.189 17.02.2006 --- Show
Trojan.Proxy.201 17.02.2006 --- Show
Trojan.Proxy.215 17.02.2006 --- Show
Trojan.Proxy.221 17.02.2006 --- Show
Trojan.Proxy.225 17.02.2006 --- Show
Trojan.Proxy.226 17.02.2006 --- Show
Trojan.Proxy.235 17.02.2006 --- Show
Trojan.Proxy.276 17.02.2006 --- Show
Trojan.Proxy.30 17.02.2006 --- Show
Trojan.Proxy.313 17.02.2006 --- Show
Trojan.Proxy.323 17.02.2006 --- Show
Trojan.Proxy.353 17.02.2006 --- Show
Trojan.Proxy.369 17.02.2006 --- Show
Trojan.Proxy.373 17.02.2006 --- Show
Trojan.Proxy.398 17.02.2006 --- Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

© Doctor Web
2003 — 2022

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies