FOR CUSTOMERS

Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Trojan.PWS.Banker.1197 17.02.2006 --- Show
Trojan.PWS.Banker.1223 17.02.2006 --- Show
Trojan.PWS.Banker.1239 17.02.2006 --- Show
Trojan.PWS.Banker.137 17.02.2006 --- Show
Trojan.PWS.Banker.138 17.02.2006 --- Show
Trojan.PWS.Banker.1405 17.02.2006 --- Show
Trojan.PWS.Banker.1414 17.02.2006 --- Show
Trojan.PWS.Banker.1519 17.02.2006 --- Show
Trojan.PWS.Banker.1520 17.02.2006 --- Show
Trojan.PWS.Banker.1521 17.02.2006 --- Show
Trojan.PWS.Banker.1522 17.02.2006 --- Show
Trojan.PWS.Banker.1523 17.02.2006 --- Show
Trojan.PWS.Banker.178 17.02.2006 --- Show
Trojan.PWS.Banker.349 17.02.2006 --- Show
Trojan.PWS.Banker.361 17.02.2006 --- Show
Trojan.PWS.Banker.585 17.02.2006 --- Show
Trojan.PWS.Banker.654 17.02.2006 --- Show
Trojan.PWS.Banker.811 17.02.2006 --- Show
Trojan.PWS.Banker.866 17.02.2006 --- Show
Trojan.PWS.Banker.882 17.02.2006 --- Show
Trojan.PWS.Banker.900 17.02.2006 --- Show
Trojan.PWS.Banker.910 17.02.2006 --- Show
Trojan.PWS.Banker.915 17.02.2006 --- Show
Trojan.PWS.Banker.920 17.02.2006 --- Show
Trojan.PWS.Banker.930 17.02.2006 --- Show
Trojan.PWS.Banker.973 17.02.2006 --- Show
Trojan.PWS.Banker.993 17.02.2006 --- Show
Trojan.PWS.Banker.based 17.02.2006 --- Show
Trojan.PWS.Behz 17.02.2006 --- Show
Trojan.PWS.Blogstat 17.02.2006 --- Show
Trojan.PWS.Bolvila 17.02.2006 --- Show
Trojan.PWS.Cedp 17.02.2006 --- Show
Trojan.PWS.Chigi 17.02.2006 --- Show
Trojan.PWS.Coced.214 17.02.2006 --- Show
Trojan.PWS.Coced.215 17.02.2006 --- Show
Trojan.PWS.Coced.216 17.02.2006 --- Show
Trojan.PWS.Coced.217 17.02.2006 --- Show
Trojan.PWS.Coced.218 17.02.2006 --- Show
Trojan.PWS.Coced.219 17.02.2006 --- Show
Trojan.PWS.Coced.220 17.02.2006 --- Show
Trojan.PWS.Coced.221 17.02.2006 --- Show
Trojan.PWS.Coced.225 17.02.2006 --- Show
Trojan.PWS.Coced.226 17.02.2006 --- Show
Trojan.PWS.Coced.229 17.02.2006 --- Show
Trojan.PWS.Coced.230 17.02.2006 --- Show
Trojan.PWS.Coced.231 17.02.2006 --- Show
Trojan.PWS.Coced.233 17.02.2006 --- Show
Trojan.PWS.Coced.234 17.02.2006 --- Show
Trojan.PWS.Coced.235 17.02.2006 --- Show
Trojan.PWS.CoolAngel 17.02.2006 --- Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

© Doctor Web
2003 — 2022

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies