Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Trojan.DownLoader.2340 16.02.2006 --- Show
Trojan.DownLoader.2341 16.02.2006 --- Show
Trojan.DownLoader.2342 16.02.2006 --- Show
Trojan.DownLoader.2343 16.02.2006 --- Show
Trojan.DownLoader.2344 16.02.2006 --- Show
Trojan.DownLoader.2345 16.02.2006 --- Show
Trojan.DownLoader.2346 16.02.2006 --- Show
Trojan.DownLoader.2347 16.02.2006 --- Show
Trojan.DownLoader.2348 16.02.2006 --- Show
Trojan.DownLoader.2349 16.02.2006 --- Show
Trojan.DownLoader.235 16.02.2006 --- Show
Trojan.DownLoader.2351 16.02.2006 --- Show
Trojan.DownLoader.2352 16.02.2006 --- Show
Trojan.DownLoader.2353 16.02.2006 --- Show
Trojan.DownLoader.2355 16.02.2006 --- Show
Trojan.DownLoader.2356 16.02.2006 --- Show
Trojan.DownLoader.2357 16.02.2006 --- Show
Trojan.DownLoader.2358 16.02.2006 --- Show
Trojan.DownLoader.236 16.02.2006 --- Show
Trojan.DownLoader.2360 16.02.2006 --- Show
Trojan.DownLoader.2361 16.02.2006 --- Show
Trojan.DownLoader.2362 16.02.2006 --- Show
Trojan.DownLoader.2364 16.02.2006 --- Show
Trojan.DownLoader.2366 16.02.2006 --- Show
Trojan.DownLoader.2367 16.02.2006 --- Show
Trojan.DownLoader.2368 16.02.2006 --- Show
Trojan.DownLoader.2369 16.02.2006 --- Show
Trojan.DownLoader.237 16.02.2006 --- Show
Trojan.DownLoader.2371 16.02.2006 --- Show
Trojan.DownLoader.2374 16.02.2006 --- Show
Trojan.DownLoader.2375 16.02.2006 --- Show
Trojan.DownLoader.2376 16.02.2006 --- Show
Trojan.DownLoader.2377 16.02.2006 --- Show
Trojan.DownLoader.2379 16.02.2006 --- Show
Trojan.DownLoader.2380 16.02.2006 --- Show
Trojan.DownLoader.2382 16.02.2006 --- Show
Trojan.DownLoader.2383 16.02.2006 --- Show
Trojan.DownLoader.2385 16.02.2006 --- Show
Trojan.DownLoader.2386 16.02.2006 --- Show
Trojan.DownLoader.2389 16.02.2006 --- Show
Trojan.DownLoader.239 16.02.2006 --- Show
Trojan.DownLoader.2391 16.02.2006 --- Show
Trojan.DownLoader.2392 16.02.2006 --- Show
Trojan.DownLoader.2393 16.02.2006 --- Show
Trojan.DownLoader.2395 16.02.2006 --- Show
Trojan.DownLoader.2396 16.02.2006 --- Show
Trojan.DownLoader.2397 16.02.2006 --- Show
Trojan.DownLoader.2398 16.02.2006 --- Show
Trojan.DownLoader.2399 16.02.2006 --- Show
Trojan.DownLoader.240 16.02.2006 --- Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

© Doctor Web
2003 — 2023

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies