Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Exploit.Siggen2.56976 25.10.2020 26.10.2020 Show
Exploit.Siggen2.56519 25.10.2020 26.10.2020 Show
Exploit.Siggen2.56682 25.10.2020 26.10.2020 Show
Exploit.Siggen2.56160 25.10.2020 26.10.2020 Show
Exploit.Siggen2.56401 25.10.2020 26.10.2020 Show
Exploit.Siggen2.55882 25.10.2020 26.10.2020 Show
Trojan.MulDrop14.11799 25.10.2020 26.10.2020 Show
Exploit.Siggen2.55819 25.10.2020 26.10.2020 Show
Exploit.Siggen2.56757 25.10.2020 26.10.2020 Show
Trojan.MulDrop14.12251 25.10.2020 26.10.2020 Show
Exploit.Siggen2.57113 25.10.2020 26.10.2020 Show
Exploit.Siggen2.55741 25.10.2020 26.10.2020 Show
Exploit.Siggen2.56810 25.10.2020 26.10.2020 Show
Exploit.Siggen2.56684 25.10.2020 26.10.2020 Show
Exploit.Siggen2.55655 25.10.2020 26.10.2020 Show
Trojan.MulDrop14.12133 25.10.2020 26.10.2020 Show
Exploit.Siggen2.55701 25.10.2020 26.10.2020 Show
Exploit.Siggen2.55904 25.10.2020 26.10.2020 Show
Exploit.Siggen2.56079 25.10.2020 26.10.2020 Show
Trojan.MulDrop14.12220 25.10.2020 26.10.2020 Show
Exploit.Siggen2.56949 25.10.2020 26.10.2020 Show
Exploit.Siggen2.56720 25.10.2020 26.10.2020 Show
Exploit.Siggen2.56229 25.10.2020 26.10.2020 Show
Exploit.Siggen2.57121 25.10.2020 26.10.2020 Show
Trojan.DownLoader35.6948 25.10.2020 26.10.2020 Show
Trojan.DownLoader35.6943 25.10.2020 26.10.2020 Show
Exploit.Siggen2.56065 25.10.2020 26.10.2020 Show
Trojan.MulDrop14.13100 25.10.2020 26.10.2020 Show
Exploit.Siggen2.55854 25.10.2020 26.10.2020 Show
Exploit.Siggen2.55920 25.10.2020 26.10.2020 Show
Exploit.Siggen2.55676 25.10.2020 26.10.2020 Show
Exploit.Siggen2.55934 25.10.2020 26.10.2020 Show
Trojan.MulDrop14.11915 25.10.2020 26.10.2020 Show
Exploit.Siggen2.56778 25.10.2020 26.10.2020 Show
Trojan.MulDrop14.11848 25.10.2020 26.10.2020 Show
Exploit.Siggen2.55738 25.10.2020 26.10.2020 Show
Trojan.MulDrop14.13223 25.10.2020 26.10.2020 Show
Exploit.Siggen2.55894 25.10.2020 26.10.2020 Show
Exploit.Siggen2.56589 25.10.2020 26.10.2020 Show
Exploit.Siggen2.57222 25.10.2020 26.10.2020 Show
Exploit.Siggen2.57016 25.10.2020 26.10.2020 Show
Trojan.MulDrop14.11824 25.10.2020 26.10.2020 Show
Exploit.Siggen2.56015 25.10.2020 26.10.2020 Show
Exploit.Siggen2.55851 25.10.2020 26.10.2020 Show
Exploit.Siggen2.56468 25.10.2020 26.10.2020 Show
Trojan.MulDrop14.11941 25.10.2020 26.10.2020 Show
Exploit.Siggen2.56324 25.10.2020 26.10.2020 Show
Trojan.MulDrop14.12031 25.10.2020 26.10.2020 Show
Exploit.Siggen2.55817 25.10.2020 26.10.2020 Show
Exploit.Siggen2.56411 25.10.2020 26.10.2020 Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.