Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Trojan.DownLoader.4602 16.02.2006 --- Show
Trojan.DownLoader.4603 16.02.2006 --- Show
Trojan.DownLoader.4604 16.02.2006 --- Show
Trojan.DownLoader.4605 16.02.2006 --- Show
Trojan.DownLoader.4606 16.02.2006 --- Show
Trojan.DownLoader.4607 16.02.2006 --- Show
Trojan.DownLoader.4608 16.02.2006 --- Show
Trojan.DownLoader.4609 16.02.2006 --- Show
Trojan.DownLoader.4610 16.02.2006 --- Show
Trojan.DownLoader.462 16.02.2006 --- Show
Trojan.DownLoader.464 16.02.2006 --- Show
Trojan.DownLoader.4640 16.02.2006 --- Show
Trojan.DownLoader.4641 16.02.2006 --- Show
Trojan.DownLoader.4642 16.02.2006 --- Show
Trojan.DownLoader.4643 16.02.2006 --- Show
Trojan.DownLoader.4644 16.02.2006 --- Show
Trojan.DownLoader.4645 16.02.2006 --- Show
Trojan.DownLoader.4649 16.02.2006 --- Show
Trojan.DownLoader.465 16.02.2006 --- Show
Trojan.DownLoader.4650 16.02.2006 --- Show
Trojan.DownLoader.4651 16.02.2006 --- Show
Trojan.DownLoader.4652 16.02.2006 --- Show
Trojan.DownLoader.4653 16.02.2006 --- Show
Trojan.DownLoader.4654 16.02.2006 --- Show
Trojan.DownLoader.4656 16.02.2006 --- Show
Trojan.DownLoader.4657 16.02.2006 --- Show
Trojan.DownLoader.4658 16.02.2006 --- Show
Trojan.DownLoader.4659 16.02.2006 --- Show
Trojan.DownLoader.466 16.02.2006 --- Show
Trojan.DownLoader.4660 16.02.2006 --- Show
Trojan.DownLoader.4661 16.02.2006 --- Show
Trojan.DownLoader.4662 16.02.2006 --- Show
Trojan.DownLoader.4664 16.02.2006 --- Show
Trojan.DownLoader.4665 16.02.2006 --- Show
Trojan.DownLoader.4667 16.02.2006 --- Show
Trojan.DownLoader.4668 16.02.2006 --- Show
Trojan.DownLoader.4669 16.02.2006 --- Show
Trojan.DownLoader.467 16.02.2006 --- Show
Trojan.DownLoader.4670 16.02.2006 --- Show
Trojan.DownLoader.4671 16.02.2006 --- Show
Trojan.DownLoader.4672 16.02.2006 --- Show
Trojan.DownLoader.4673 16.02.2006 --- Show
Trojan.DownLoader.4674 16.02.2006 --- Show
Trojan.DownLoader.4675 16.02.2006 --- Show
Trojan.DownLoader.4678 16.02.2006 --- Show
Trojan.DownLoader.4679 16.02.2006 --- Show
Trojan.DownLoader.4680 16.02.2006 --- Show
Trojan.DownLoader.4681 16.02.2006 --- Show
Trojan.DownLoader.4682 16.02.2006 --- Show
Trojan.DownLoader.4683 16.02.2006 --- Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

© Doctor Web
2003 — 2022

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies