Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
PMEW.based 17.02.2006 --- Show
Puf.581 17.02.2006 --- Show
Sampo 17.02.2006 --- Show
Sampo.dropper 17.02.2006 --- Show
SanLorenzo.1355 17.02.2006 --- Show
Sds.1906 17.02.2006 --- Show
Secretary 17.02.2006 --- Show
SGWW.Zoo 17.02.2006 --- Show
SillyC.103 17.02.2006 --- Show
SillyC.159 17.02.2006 --- Show
SillyC.160 17.02.2006 --- Show
SillyC.162 17.02.2006 --- Show
SillyC.170 17.02.2006 --- Show
SillyC.178 17.02.2006 --- Show
SillyC.181 17.02.2006 --- Show
SillyC.185 17.02.2006 --- Show
SillyC.189 17.02.2006 --- Show
SillyC.200 17.02.2006 --- Show
SillyC.205 17.02.2006 --- Show
SillyC.217 17.02.2006 --- Show
SillyC.227 17.02.2006 --- Show
SillyC.246 17.02.2006 --- Show
SillyC.277 17.02.2006 --- Show
SillyC.452 17.02.2006 --- Show
SillyC.553 17.02.2006 --- Show
SillyE.230 17.02.2006 --- Show
SillyE.234 17.02.2006 --- Show
SillyE.424 17.02.2006 --- Show
SillyRC.693 17.02.2006 --- Show
SillyRCE.837 17.02.2006 --- Show
SillyRCE.851 17.02.2006 --- Show
SillyRCE.891 17.02.2006 --- Show
SillyRCE.920 17.02.2006 --- Show
SillyRCE.947 17.02.2006 --- Show
SillyRE.517 17.02.2006 --- Show
Slips.643 17.02.2006 --- Show
Small.125 17.02.2006 --- Show
Smile.4304 17.02.2006 --- Show
Smile.4320 17.02.2006 --- Show
Smile.5504 17.02.2006 --- Show
Solar.97 17.02.2006 --- Show
SPL.Generator 17.02.2006 --- Show
SS.Generator.11 17.02.2006 --- Show
Supervisor.1878 17.02.2006 --- Show
Suriv.1413 17.02.2006 --- Show
Tiny.125 17.02.2006 --- Show
Tiny.139 17.02.2006 --- Show
Tiny.226 17.02.2006 --- Show
Tiny.92 17.02.2006 --- Show
Tiny.94 17.02.2006 --- Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

© Doctor Web
2003 — 2022

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies