Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Trojan.DownLoader.2400 16.02.2006 --- Show
Trojan.DownLoader.2401 16.02.2006 --- Show
Trojan.DownLoader.2404 16.02.2006 --- Show
Trojan.DownLoader.2406 16.02.2006 --- Show
Trojan.DownLoader.2407 16.02.2006 --- Show
Trojan.DownLoader.2409 16.02.2006 --- Show
Trojan.DownLoader.2410 16.02.2006 --- Show
Trojan.DownLoader.2411 16.02.2006 --- Show
Trojan.DownLoader.24123 16.02.2006 --- Show
Trojan.DownLoader.2414 16.02.2006 --- Show
Trojan.DownLoader.2415 16.02.2006 --- Show
Trojan.DownLoader.2416 16.02.2006 --- Show
Trojan.DownLoader.2419 16.02.2006 --- Show
Trojan.DownLoader.242 16.02.2006 --- Show
Trojan.DownLoader.2423 16.02.2006 --- Show
Trojan.DownLoader.2424 16.02.2006 --- Show
Trojan.DownLoader.2425 16.02.2006 --- Show
Trojan.DownLoader.2426 16.02.2006 --- Show
Trojan.DownLoader.2427 16.02.2006 --- Show
Trojan.DownLoader.2428 16.02.2006 --- Show
Trojan.DownLoader.2429 16.02.2006 --- Show
Trojan.DownLoader.2430 16.02.2006 --- Show
Trojan.DownLoader.2431 16.02.2006 --- Show
Trojan.DownLoader.2432 16.02.2006 --- Show
Trojan.DownLoader.2433 16.02.2006 --- Show
Trojan.DownLoader.2434 16.02.2006 --- Show
Trojan.DownLoader.2435 16.02.2006 --- Show
Trojan.DownLoader.2437 16.02.2006 --- Show
Trojan.DownLoader.2439 16.02.2006 --- Show
Trojan.DownLoader.244 16.02.2006 --- Show
Trojan.DownLoader.2441 16.02.2006 --- Show
Trojan.DownLoader.2442 16.02.2006 --- Show
Trojan.DownLoader.2443 16.02.2006 --- Show
Trojan.DownLoader.2444 16.02.2006 --- Show
Trojan.DownLoader.2445 16.02.2006 --- Show
Trojan.DownLoader.2446 16.02.2006 --- Show
Trojan.DownLoader.2447 16.02.2006 --- Show
Trojan.DownLoader.2448 16.02.2006 --- Show
Trojan.DownLoader.2449 16.02.2006 --- Show
Trojan.DownLoader.245 16.02.2006 --- Show
Trojan.DownLoader.2450 16.02.2006 --- Show
Trojan.DownLoader.2451 16.02.2006 --- Show
Trojan.DownLoader.2452 16.02.2006 --- Show
Trojan.DownLoader.2454 16.02.2006 --- Show
Trojan.DownLoader.2455 16.02.2006 --- Show
Trojan.DownLoader.2456 16.02.2006 --- Show
Trojan.DownLoader.2457 16.02.2006 --- Show
Trojan.DownLoader.24576 16.02.2006 --- Show
Trojan.DownLoader.2458 16.02.2006 --- Show
Trojan.DownLoader.2459 16.02.2006 --- Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

© Doctor Web
2003 — 2023

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies