FOR CUSTOMERS

Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Znosko.1730 17.02.2006 --- Show
Znosko.509 17.02.2006 --- Show
Zog.1167 17.02.2006 --- Show
Zogzog.915 17.02.2006 --- Show
Zohra.4160 17.02.2006 --- Show
Zohra.4382 17.02.2006 --- Show
Zohra.4488 17.02.2006 --- Show
Zohra.4516 17.02.2006 --- Show
Zohra.4525 17.02.2006 --- Show
Zombie.16384 17.02.2006 --- Show
Zombie.1922 17.02.2006 --- Show
Zombie.2553 17.02.2006 --- Show
Zombie.667 17.02.2006 --- Show
Zombie.745 17.02.2006 --- Show
Zombie.747 17.02.2006 --- Show
Zombie.dropper.16384 17.02.2006 --- Show
Zombie.dropper.1889 17.02.2006 --- Show
Zombie.dropper.1922 17.02.2006 --- Show
Zombie.PGPMorph 17.02.2006 --- Show
Zombie.PGPMorph.4592 17.02.2006 --- Show
Zorce.316 17.02.2006 --- Show
Zorce.799 17.02.2006 --- Show
Zorm.1120 17.02.2006 --- Show
Zorm.1123 17.02.2006 --- Show
Zorm.1139 17.02.2006 --- Show
Zorm.1193 17.02.2006 --- Show
Zorm.1404 17.02.2006 --- Show
Zorm.1412 17.02.2006 --- Show
Zorm.1475 17.02.2006 --- Show
Zorm.1807 17.02.2006 --- Show
Zorm.1826 17.02.2006 --- Show
Zorm.1863 17.02.2006 --- Show
Zorm.460 17.02.2006 --- Show
Zorm.based 17.02.2006 --- Show
Zorm.dropper.1193 17.02.2006 --- Show
Zuca.677 17.02.2006 --- Show
Zulu.1360 17.02.2006 --- Show
Zune.1958 17.02.2006 --- Show
Zune.2571 17.02.2006 --- Show
Zune.2588 17.02.2006 --- Show
ZW.1967 17.02.2006 --- Show
Zwickau.505 17.02.2006 --- Show
Zxx.600 17.02.2006 --- Show
Zyrtec.4300 17.02.2006 --- Show
Zyx.5739 17.02.2006 --- Show
ZzTop.429 17.02.2006 --- Show
Zzz.1379 17.02.2006 --- Show
1C.Gonat 16.02.2006 --- Show
4on.1346 16.02.2006 --- Show
4res.1049 16.02.2006 --- Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

© Doctor Web
2003 — 2022

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies