Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Trojan.DownLoader.4684 16.02.2006 --- Show
Trojan.DownLoader.4685 16.02.2006 --- Show
Trojan.DownLoader.4687 16.02.2006 --- Show
Trojan.DownLoader.4689 16.02.2006 --- Show
Trojan.DownLoader.4690 16.02.2006 --- Show
Trojan.DownLoader.4691 16.02.2006 --- Show
Trojan.DownLoader.4692 16.02.2006 --- Show
Trojan.DownLoader.4693 16.02.2006 --- Show
Trojan.DownLoader.4694 16.02.2006 --- Show
Trojan.DownLoader.4696 16.02.2006 --- Show
Trojan.DownLoader.4697 16.02.2006 --- Show
Trojan.DownLoader.4699 16.02.2006 --- Show
Trojan.DownLoader.4700 16.02.2006 --- Show
Trojan.DownLoader.4703 16.02.2006 --- Show
Trojan.DownLoader.4705 16.02.2006 --- Show
Trojan.DownLoader.4706 16.02.2006 --- Show
Trojan.DownLoader.4707 16.02.2006 --- Show
Trojan.DownLoader.471 16.02.2006 --- Show
Trojan.DownLoader.4710 16.02.2006 --- Show
Trojan.DownLoader.4714 16.02.2006 --- Show
Trojan.DownLoader.4715 16.02.2006 --- Show
Trojan.DownLoader.4716 16.02.2006 --- Show
Trojan.DownLoader.4717 16.02.2006 --- Show
Trojan.DownLoader.4718 16.02.2006 --- Show
Trojan.DownLoader.4722 16.02.2006 --- Show
Trojan.DownLoader.4724 16.02.2006 --- Show
Trojan.DownLoader.4725 16.02.2006 --- Show
Trojan.DownLoader.4726 16.02.2006 --- Show
Trojan.DownLoader.4727 16.02.2006 --- Show
Trojan.DownLoader.4728 16.02.2006 --- Show
Trojan.DownLoader.473 16.02.2006 --- Show
Trojan.DownLoader.4732 16.02.2006 --- Show
Trojan.DownLoader.4733 16.02.2006 --- Show
Trojan.DownLoader.4734 16.02.2006 --- Show
Trojan.DownLoader.4735 16.02.2006 --- Show
Trojan.DownLoader.4736 16.02.2006 --- Show
Trojan.DownLoader.4737 16.02.2006 --- Show
Trojan.DownLoader.4738 16.02.2006 --- Show
Trojan.DownLoader.474 16.02.2006 --- Show
Trojan.DownLoader.4740 16.02.2006 --- Show
Trojan.DownLoader.4741 16.02.2006 --- Show
Trojan.DownLoader.4742 16.02.2006 --- Show
Trojan.DownLoader.4743 16.02.2006 --- Show
Trojan.DownLoader.4744 16.02.2006 --- Show
Trojan.DownLoader.4746 16.02.2006 --- Show
Trojan.DownLoader.4747 16.02.2006 --- Show
Trojan.DownLoader.4748 16.02.2006 --- Show
Trojan.DownLoader.4749 16.02.2006 --- Show
Trojan.DownLoader.475 16.02.2006 --- Show
Trojan.DownLoader.4750 16.02.2006 --- Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

© Doctor Web
2003 — 2022

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies