Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
BackDoor.IRC.Sdbot.340 17.02.2006 --- Show
BackDoor.IRC.Sdbot.358 17.02.2006 --- Show
BackDoor.IRC.Sdbot.7 17.02.2006 --- Show
BackDoor.IRC.Tkbot 17.02.2006 --- Show
BackDoor.IRC.Voltarei 17.02.2006 --- Show
BackDoor.Isn 17.02.2006 --- Show
BackDoor.Jerry 17.02.2006 --- Show
BackDoor.Jorge 17.02.2006 --- Show
BackDoor.Jshx 17.02.2006 --- Show
BackDoor.Judas 17.02.2006 --- Show
BackDoor.Jupsa 17.02.2006 --- Show
BackDoor.Karst 17.02.2006 --- Show
BackDoor.Krlua 17.02.2006 --- Show
BackDoor.Kucun.40 17.02.2006 --- Show
BackDoor.Lamerat.11 17.02.2006 --- Show
BackDoor.Latinus 17.02.2006 --- Show
BackDoor.Latinus.10 17.02.2006 --- Show
BackDoor.Latinus.13 17.02.2006 --- Show
BackDoor.Latinus.15 17.02.2006 --- Show
BackDoor.Lauri 17.02.2006 --- Show
BackDoor.LDown 17.02.2006 --- Show
BackDoor.Level 17.02.2006 --- Show
BackDoor.Liss 17.02.2006 --- Show
BackDoor.Lmdoom 17.02.2006 --- Show
BackDoor.Loyzbot 17.02.2006 --- Show
BackDoor.Matrix.5 17.02.2006 --- Show
BackDoor.Mesiha 17.02.2006 --- Show
BackDoor.Messiah.30 17.02.2006 --- Show
BackDoor.Microkosmus 17.02.2006 --- Show
BackDoor.Mozzy 17.02.2006 --- Show
BackDoor.MPass 17.02.2006 --- Show
BackDoor.Mxl 17.02.2006 --- Show
BackDoor.Mystic 17.02.2006 --- Show
BackDoor.Netag 17.02.2006 --- Show
BackDoor.Netangel.10 17.02.2006 --- Show
BackDoor.NetSphere.130 17.02.2006 --- Show
BackDoor.Ngm 17.02.2006 --- Show
BackDoor.Nuclear.18 17.02.2006 --- Show
BackDoor.Nuclear.19 17.02.2006 --- Show
BackDoor.Nuclear.20 17.02.2006 --- Show
BackDoor.Nuclear.23 17.02.2006 --- Show
BackDoor.Nuclearat.62 17.02.2006 --- Show
BackDoor.Ofsong 17.02.2006 --- Show
BackDoor.Okapix 17.02.2006 --- Show
BackDoor.Paradise.10 17.02.2006 --- Show
BackDoor.Paraq 17.02.2006 --- Show
BackDoor.Paxter 17.02.2006 --- Show
BackDoor.Pest.10 17.02.2006 --- Show
BackDoor.Phoenix 17.02.2006 --- Show
BackDoor.Pigeon.115 17.02.2006 --- Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

© Doctor Web
2003 — 2022

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies