Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Trojan.DownLoader.246 16.02.2006 --- Show
Trojan.DownLoader.2460 16.02.2006 --- Show
Trojan.DownLoader.2461 16.02.2006 --- Show
Trojan.DownLoader.2462 16.02.2006 --- Show
Trojan.DownLoader.2463 16.02.2006 --- Show
Trojan.DownLoader.2464 16.02.2006 --- Show
Trojan.DownLoader.2465 16.02.2006 --- Show
Trojan.DownLoader.2466 16.02.2006 --- Show
Trojan.DownLoader.2467 16.02.2006 --- Show
Trojan.DownLoader.2469 16.02.2006 --- Show
Trojan.DownLoader.247 16.02.2006 --- Show
Trojan.DownLoader.2471 16.02.2006 --- Show
Trojan.DownLoader.2472 16.02.2006 --- Show
Trojan.DownLoader.2473 16.02.2006 --- Show
Trojan.DownLoader.2474 16.02.2006 --- Show
Trojan.DownLoader.2477 16.02.2006 --- Show
Trojan.DownLoader.2479 16.02.2006 --- Show
Trojan.DownLoader.2481 16.02.2006 --- Show
Trojan.DownLoader.2482 16.02.2006 --- Show
Trojan.DownLoader.24854 16.02.2006 --- Show
Trojan.DownLoader.2486 16.02.2006 --- Show
Trojan.DownLoader.249 16.02.2006 --- Show
Trojan.DownLoader.2490 16.02.2006 --- Show
Trojan.DownLoader.2491 16.02.2006 --- Show
Trojan.DownLoader.2492 16.02.2006 --- Show
Trojan.DownLoader.2493 16.02.2006 --- Show
Trojan.DownLoader.2494 16.02.2006 --- Show
Trojan.DownLoader.2495 16.02.2006 --- Show
Trojan.DownLoader.2496 16.02.2006 --- Show
Trojan.DownLoader.2497 16.02.2006 --- Show
Trojan.DownLoader.2498 16.02.2006 --- Show
Trojan.DownLoader.2500 16.02.2006 --- Show
Trojan.DownLoader.2501 16.02.2006 --- Show
Trojan.DownLoader.2502 16.02.2006 --- Show
Trojan.DownLoader.2503 16.02.2006 --- Show
Trojan.DownLoader.2504 16.02.2006 --- Show
Trojan.DownLoader.2506 16.02.2006 --- Show
Trojan.DownLoader.2507 16.02.2006 --- Show
Trojan.DownLoader.2508 16.02.2006 --- Show
Trojan.DownLoader.2509 16.02.2006 --- Show
Trojan.DownLoader.251 16.02.2006 --- Show
Trojan.DownLoader.2510 16.02.2006 --- Show
Trojan.DownLoader.2512 16.02.2006 --- Show
Trojan.DownLoader.2513 16.02.2006 --- Show
Trojan.DownLoader.2516 16.02.2006 --- Show
Trojan.DownLoader.2517 16.02.2006 --- Show
Trojan.DownLoader.2518 16.02.2006 --- Show
Trojan.DownLoader.2519 16.02.2006 --- Show
Trojan.DownLoader.252 16.02.2006 --- Show
Trojan.DownLoader.2521 16.02.2006 --- Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

© Doctor Web
2003 — 2023

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies