Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Trojan.DownLoader.4812 16.02.2006 --- Show
Trojan.DownLoader.4813 16.02.2006 --- Show
Trojan.DownLoader.4814 16.02.2006 --- Show
Trojan.DownLoader.4815 16.02.2006 --- Show
Trojan.DownLoader.4816 16.02.2006 --- Show
Trojan.DownLoader.4817 16.02.2006 --- Show
Trojan.DownLoader.4818 16.02.2006 --- Show
Trojan.DownLoader.482 16.02.2006 --- Show
Trojan.DownLoader.4821 16.02.2006 --- Show
Trojan.DownLoader.4822 16.02.2006 --- Show
Trojan.DownLoader.4825 16.02.2006 --- Show
Trojan.DownLoader.4826 16.02.2006 --- Show
Trojan.DownLoader.4828 16.02.2006 --- Show
Trojan.DownLoader.4829 16.02.2006 --- Show
Trojan.DownLoader.483 16.02.2006 --- Show
Trojan.DownLoader.4830 16.02.2006 --- Show
Trojan.DownLoader.4833 16.02.2006 --- Show
Trojan.DownLoader.4834 16.02.2006 --- Show
Trojan.DownLoader.4835 16.02.2006 --- Show
Trojan.DownLoader.4838 16.02.2006 --- Show
Trojan.DownLoader.4839 16.02.2006 --- Show
Trojan.DownLoader.4840 16.02.2006 --- Show
Trojan.DownLoader.4841 16.02.2006 --- Show
Trojan.DownLoader.4843 16.02.2006 --- Show
Trojan.DownLoader.4844 16.02.2006 --- Show
Trojan.DownLoader.4845 16.02.2006 --- Show
Trojan.DownLoader.4846 16.02.2006 --- Show
Trojan.DownLoader.4847 16.02.2006 --- Show
Trojan.DownLoader.4848 16.02.2006 --- Show
Trojan.DownLoader.4851 16.02.2006 --- Show
Trojan.DownLoader.4854 16.02.2006 --- Show
Trojan.DownLoader.4855 16.02.2006 --- Show
Trojan.DownLoader.4857 16.02.2006 --- Show
Trojan.DownLoader.4859 16.02.2006 --- Show
Trojan.DownLoader.486 16.02.2006 --- Show
Trojan.DownLoader.4860 16.02.2006 --- Show
Trojan.DownLoader.4861 16.02.2006 --- Show
Trojan.DownLoader.4862 16.02.2006 --- Show
Trojan.DownLoader.4863 16.02.2006 --- Show
Trojan.DownLoader.4864 16.02.2006 --- Show
Trojan.DownLoader.4865 16.02.2006 --- Show
Trojan.DownLoader.4866 16.02.2006 --- Show
Trojan.DownLoader.4867 16.02.2006 --- Show
Trojan.DownLoader.4868 16.02.2006 --- Show
Trojan.DownLoader.4869 16.02.2006 --- Show
Trojan.DownLoader.4870 16.02.2006 --- Show
Trojan.DownLoader.4872 16.02.2006 --- Show
Trojan.DownLoader.4873 16.02.2006 --- Show
Trojan.DownLoader.4875 16.02.2006 --- Show
Trojan.DownLoader.4876 16.02.2006 --- Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

© Doctor Web
2003 — 2022

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies