FOR CUSTOMERS

Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
BackDoor.Xconf.15 11.04.2006 --- Show
BackDoor.Xconf.16 11.04.2006 --- Show
BAT.FormatC 11.04.2006 --- Show
Dialer.Czy 11.04.2006 --- Show
Dialer.Liquid 11.04.2006 --- Show
Dialer.Livecam 11.04.2006 --- Show
Exploit.MS05-020 11.04.2006 --- Show
Exploit.MS05-039 11.04.2006 --- Show
FDOS.IcqFlood 11.04.2006 --- Show
Linux.BackDoor.Rev 11.04.2006 --- Show
Program.PwdFind 11.04.2006 --- Show
Program.ServUServer.5205 11.04.2006 --- Show
Trojan.Click.1044 11.04.2006 --- Show
Trojan.Click.1047 11.04.2006 --- Show
Trojan.Click.1048 11.04.2006 --- Show
Trojan.Click.1049 11.04.2006 --- Show
Trojan.Click.1051 11.04.2006 --- Show
Trojan.Click.1052 11.04.2006 --- Show
Trojan.Click.1053 11.04.2006 --- Show
Trojan.Click.1054 11.04.2006 --- Show
Trojan.Click.1055 11.04.2006 --- Show
Trojan.Click.1057 11.04.2006 --- Show
Trojan.Click.1058 11.04.2006 --- Show
Trojan.Click.1059 11.04.2006 --- Show
Trojan.Click.1060 11.04.2006 --- Show
Trojan.Click.1061 11.04.2006 --- Show
Trojan.Click.1062 11.04.2006 --- Show
Trojan.Click.1064 11.04.2006 --- Show
Trojan.Click.1087 11.04.2006 --- Show
Trojan.Click.1089 11.04.2006 --- Show
Trojan.Click.1090 11.04.2006 --- Show
Trojan.Click.1091 11.04.2006 --- Show
Trojan.Click.1092 11.04.2006 --- Show
Trojan.Click.1093 11.04.2006 --- Show
Trojan.DownLoader.4316 11.04.2006 --- Show
Trojan.DownLoader.8521 11.04.2006 --- Show
Trojan.DownLoader.8581 11.04.2006 --- Show
Trojan.DownLoader.8587 11.04.2006 --- Show
Trojan.DownLoader.8588 11.04.2006 --- Show
Trojan.DownLoader.8589 11.04.2006 --- Show
Trojan.DownLoader.8590 11.04.2006 --- Show
Trojan.DownLoader.8591 11.04.2006 --- Show
Trojan.DownLoader.8592 11.04.2006 --- Show
Trojan.DownLoader.8593 11.04.2006 --- Show
Trojan.DownLoader.8594 11.04.2006 --- Show
Trojan.DownLoader.8595 11.04.2006 --- Show
Trojan.DownLoader.8596 11.04.2006 --- Show
Trojan.DownLoader.8597 11.04.2006 --- Show
Trojan.DownLoader.8598 11.04.2006 --- Show
Trojan.DownLoader.8599 11.04.2006 --- Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

© Doctor Web
2003 — 2022

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies