Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Trojan.MulDrop.950 17.02.2006 --- Show
Trojan.MulDrop.952 17.02.2006 --- Show
Trojan.MulDrop.954 17.02.2006 --- Show
Trojan.MulDrop.975 17.02.2006 --- Show
Trojan.Mygot 17.02.2006 --- Show
Trojan.MyPics 17.02.2006 --- Show
Trojan.Mzu 17.02.2006 --- Show
Trojan.Nadoc 17.02.2006 --- Show
Trojan.Nakebind 17.02.2006 --- Show
Trojan.Naupoint 17.02.2006 --- Show
Trojan.NCW 17.02.2006 --- Show
Trojan.Neck.10 17.02.2006 --- Show
Trojan.Niticat 17.02.2006 --- Show
Trojan.Nosecur 17.02.2006 --- Show
Trojan.Notask 17.02.2006 --- Show
Trojan.Nrop 17.02.2006 --- Show
Trojan.NtRootKit.47 17.02.2006 --- Show
Trojan.NtRootKit.58 17.02.2006 --- Show
Trojan.Nuke 17.02.2006 --- Show
Trojan.Offun 17.02.2006 --- Show
Trojan.Oleg 17.02.2006 --- Show
Trojan.Omicron.4 17.02.2006 --- Show
Trojan.Overture 17.02.2006 --- Show
Trojan.Paranote 17.02.2006 --- Show
Trojan.Parkin 17.02.2006 --- Show
Trojan.Pbpac 17.02.2006 --- Show
Trojan.Peflog.12 17.02.2006 --- Show
Trojan.Peflog.41 17.02.2006 --- Show
Trojan.Peun 17.02.2006 --- Show
Trojan.Picture 17.02.2006 --- Show
Trojan.Polo 17.02.2006 --- Show
Trojan.Popups 17.02.2006 --- Show
Trojan.Predator 17.02.2006 --- Show
Trojan.ProAgent.20 17.02.2006 --- Show
Trojan.Projin 17.02.2006 --- Show
Trojan.Prosiak 17.02.2006 --- Show
Trojan.Proxy.105 17.02.2006 --- Show
Trojan.Proxy.106 17.02.2006 --- Show
Trojan.Proxy.113 17.02.2006 --- Show
Trojan.Proxy.115 17.02.2006 --- Show
Trojan.Proxy.120 17.02.2006 --- Show
Trojan.Proxy.133 17.02.2006 --- Show
Trojan.Proxy.140 17.02.2006 --- Show
Trojan.Proxy.143 17.02.2006 --- Show
Trojan.Proxy.146 17.02.2006 --- Show
Trojan.Proxy.149 17.02.2006 --- Show
Trojan.Proxy.162 17.02.2006 --- Show
Trojan.Proxy.170 17.02.2006 --- Show
Trojan.Proxy.189 17.02.2006 --- Show
Trojan.Proxy.201 17.02.2006 --- Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

© Doctor Web
2003 — 2022

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies