Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Trojan.DownLoader.528 16.02.2006 --- Show
Trojan.DownLoader.5281 16.02.2006 --- Show
Trojan.DownLoader.5283 16.02.2006 --- Show
Trojan.DownLoader.5284 16.02.2006 --- Show
Trojan.DownLoader.5285 16.02.2006 --- Show
Trojan.DownLoader.5286 16.02.2006 --- Show
Trojan.DownLoader.5287 16.02.2006 --- Show
Trojan.DownLoader.5288 16.02.2006 --- Show
Trojan.DownLoader.5291 16.02.2006 --- Show
Trojan.DownLoader.5292 16.02.2006 --- Show
Trojan.DownLoader.5293 16.02.2006 --- Show
Trojan.DownLoader.5300 16.02.2006 --- Show
Trojan.DownLoader.5301 16.02.2006 --- Show
Trojan.DownLoader.5302 16.02.2006 --- Show
Trojan.DownLoader.5303 16.02.2006 --- Show
Trojan.DownLoader.5305 16.02.2006 --- Show
Trojan.DownLoader.5306 16.02.2006 --- Show
Trojan.DownLoader.5307 16.02.2006 --- Show
Trojan.DownLoader.5310 16.02.2006 --- Show
Trojan.DownLoader.5313 16.02.2006 --- Show
Trojan.DownLoader.5319 16.02.2006 --- Show
Trojan.DownLoader.532 16.02.2006 --- Show
Trojan.DownLoader.5320 16.02.2006 --- Show
Trojan.DownLoader.5321 16.02.2006 --- Show
Trojan.DownLoader.5323 16.02.2006 --- Show
Trojan.DownLoader.5324 16.02.2006 --- Show
Trojan.DownLoader.53248 16.02.2006 --- Show
Trojan.DownLoader.5325 16.02.2006 --- Show
Trojan.DownLoader.5329 16.02.2006 --- Show
Trojan.DownLoader.533 16.02.2006 --- Show
Trojan.DownLoader.5330 16.02.2006 --- Show
Trojan.DownLoader.5331 16.02.2006 --- Show
Trojan.DownLoader.5332 16.02.2006 --- Show
Trojan.DownLoader.5333 16.02.2006 --- Show
Trojan.DownLoader.5334 16.02.2006 --- Show
Trojan.DownLoader.5338 16.02.2006 --- Show
Trojan.DownLoader.5339 16.02.2006 --- Show
Trojan.DownLoader.534 16.02.2006 --- Show
Trojan.DownLoader.5340 16.02.2006 --- Show
Trojan.DownLoader.5341 16.02.2006 --- Show
Trojan.DownLoader.5342 16.02.2006 --- Show
Trojan.DownLoader.5344 16.02.2006 --- Show
Trojan.DownLoader.5345 16.02.2006 --- Show
Trojan.DownLoader.5346 16.02.2006 --- Show
Trojan.DownLoader.5347 16.02.2006 --- Show
Trojan.DownLoader.5348 16.02.2006 --- Show
Trojan.DownLoader.535 16.02.2006 --- Show
Trojan.DownLoader.5350 16.02.2006 --- Show
Trojan.DownLoader.5351 16.02.2006 --- Show
Trojan.DownLoader.5353 16.02.2006 --- Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

© Doctor Web
2003 — 2023

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies