Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Trojan.DownLoader.4878 16.02.2006 --- Show
Trojan.DownLoader.4882 16.02.2006 --- Show
Trojan.DownLoader.4883 16.02.2006 --- Show
Trojan.DownLoader.4884 16.02.2006 --- Show
Trojan.DownLoader.4886 16.02.2006 --- Show
Trojan.DownLoader.4887 16.02.2006 --- Show
Trojan.DownLoader.4889 16.02.2006 --- Show
Trojan.DownLoader.489 16.02.2006 --- Show
Trojan.DownLoader.4890 16.02.2006 --- Show
Trojan.DownLoader.4892 16.02.2006 --- Show
Trojan.DownLoader.4893 16.02.2006 --- Show
Trojan.DownLoader.4894 16.02.2006 --- Show
Trojan.DownLoader.4895 16.02.2006 --- Show
Trojan.DownLoader.4896 16.02.2006 --- Show
Trojan.DownLoader.4898 16.02.2006 --- Show
Trojan.DownLoader.4899 16.02.2006 --- Show
Trojan.DownLoader.4900 16.02.2006 --- Show
Trojan.DownLoader.4901 16.02.2006 --- Show
Trojan.DownLoader.4902 16.02.2006 --- Show
Trojan.DownLoader.4903 16.02.2006 --- Show
Trojan.DownLoader.4904 16.02.2006 --- Show
Trojan.DownLoader.4905 16.02.2006 --- Show
Trojan.DownLoader.4906 16.02.2006 --- Show
Trojan.DownLoader.4907 16.02.2006 --- Show
Trojan.DownLoader.4908 16.02.2006 --- Show
Trojan.DownLoader.491 16.02.2006 --- Show
Trojan.DownLoader.4910 16.02.2006 --- Show
Trojan.DownLoader.4911 16.02.2006 --- Show
Trojan.DownLoader.4913 16.02.2006 --- Show
Trojan.DownLoader.49152 16.02.2006 --- Show
Trojan.DownLoader.4920 16.02.2006 --- Show
Trojan.DownLoader.4922 16.02.2006 --- Show
Trojan.DownLoader.4923 16.02.2006 --- Show
Trojan.DownLoader.4924 16.02.2006 --- Show
Trojan.DownLoader.4925 16.02.2006 --- Show
Trojan.DownLoader.4926 16.02.2006 --- Show
Trojan.DownLoader.4928 16.02.2006 --- Show
Trojan.DownLoader.4929 16.02.2006 --- Show
Trojan.DownLoader.493 16.02.2006 --- Show
Trojan.DownLoader.4932 16.02.2006 --- Show
Trojan.DownLoader.4935 16.02.2006 --- Show
Trojan.DownLoader.4936 16.02.2006 --- Show
Trojan.DownLoader.4938 16.02.2006 --- Show
Trojan.DownLoader.4939 16.02.2006 --- Show
Trojan.DownLoader.494 16.02.2006 --- Show
Trojan.DownLoader.4940 16.02.2006 --- Show
Trojan.DownLoader.4941 16.02.2006 --- Show
Trojan.DownLoader.4942 16.02.2006 --- Show
Trojan.DownLoader.4945 16.02.2006 --- Show
Trojan.DownLoader.4946 16.02.2006 --- Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

© Doctor Web
2003 — 2022

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies