Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
BackDoor.Elfrit.12 16.02.2006 --- Show
BackDoor.Elirt.10 16.02.2006 --- Show
BackDoor.EliteSpyz.4 16.02.2006 --- Show
BackDoor.Elkcro 16.02.2006 --- Show
BackDoor.Elodie 16.02.2006 --- Show
BackDoor.Empty 16.02.2006 --- Show
BackDoor.Emulbox 16.02.2006 --- Show
BackDoor.Emule.2 16.02.2006 --- Show
BackDoor.Emule.3 16.02.2006 --- Show
BackDoor.Emule.4 16.02.2006 --- Show
BackDoor.Emule.42 16.02.2006 --- Show
BackDoor.Emule.5 16.02.2006 --- Show
BackDoor.Encontra 16.02.2006 --- Show
BackDoor.Enculator.1 16.02.2006 --- Show
BackDoor.Enculator.10 16.02.2006 --- Show
BackDoor.Endriv 16.02.2006 --- Show
BackDoor.Enforce 16.02.2006 --- Show
BackDoor.Enigma 16.02.2006 --- Show
BackDoor.Enigma.224 16.02.2006 --- Show
BackDoor.Enkee 16.02.2006 --- Show
BackDoor.Enterprise 16.02.2006 --- Show
BackDoor.Enviar.10 16.02.2006 --- Show
BackDoor.Envoie 16.02.2006 --- Show
BackDoor.Ereet 16.02.2006 --- Show
BackDoor.Ereet.20 16.02.2006 --- Show
BackDoor.Ereet.2115 16.02.2006 --- Show
BackDoor.Erenc 16.02.2006 --- Show
BackDoor.Eret.20 16.02.2006 --- Show
BackDoor.Eret.21 16.02.2006 --- Show
BackDoor.Ernog 16.02.2006 --- Show
BackDoor.Errmes 16.02.2006 --- Show
BackDoor.Error 16.02.2006 --- Show
BackDoor.Esclipse 16.02.2006 --- Show
BackDoor.Esds 16.02.2006 --- Show
BackDoor.Esp 16.02.2006 --- Show
BackDoor.Espana 16.02.2006 --- Show
BackDoor.Espion.11 16.02.2006 --- Show
BackDoor.Espionage 16.02.2006 --- Show
BackDoor.Essense 16.02.2006 --- Show
BackDoor.Este.10 16.02.2006 --- Show
BackDoor.Estrela.10 16.02.2006 --- Show
BackDoor.Estu 16.02.2006 --- Show
BackDoor.Etang.10 16.02.2006 --- Show
BackDoor.Etred 16.02.2006 --- Show
BackDoor.Etunnel 16.02.2006 --- Show
BackDoor.Eula 16.02.2006 --- Show
BackDoor.Evade.113 16.02.2006 --- Show
BackDoor.Evade.13 16.02.2006 --- Show
BackDoor.Evcil 16.02.2006 --- Show
BackDoor.EventHor 16.02.2006 --- Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

© Doctor Web
2003 — 2022

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies