Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Trojan.Siggen10.8534 26.08.2020 26.08.2020 Show
Trojan.DownLoader34.28180 26.08.2020 26.08.2020 Show
Trojan.Siggen10.8564 26.08.2020 26.08.2020 Show
Trojan.DownLoader34.28212 26.08.2020 26.08.2020 Show
Trojan.DownLoader34.28098 26.08.2020 26.08.2020 Show
Trojan.MulDrop13.46811 26.08.2020 26.08.2020 Show
Trojan.DownLoader34.28391 26.08.2020 26.08.2020 Show
Trojan.Siggen10.8735 26.08.2020 26.08.2020 Show
Trojan.MulDrop13.46817 26.08.2020 26.08.2020 Show
Exploit.Siggen2.27138 26.08.2020 26.08.2020 Show
Trojan.Siggen10.2663 26.08.2020 26.08.2020 Show
Trojan.DownLoader34.28354 26.08.2020 26.08.2020 Show
Exploit.Siggen2.27135 26.08.2020 26.08.2020 Show
Trojan.MulDrop13.46832 26.08.2020 26.08.2020 Show
Trojan.DownLoader34.28178 26.08.2020 26.08.2020 Show
Trojan.MulDrop13.46616 26.08.2020 26.08.2020 Show
Trojan.DownLoader34.28078 26.08.2020 26.08.2020 Show
Trojan.Siggen10.8656 26.08.2020 26.08.2020 Show
Trojan.Siggen10.8569 26.08.2020 26.08.2020 Show
Exploit.Siggen2.27106 26.08.2020 26.08.2020 Show
Trojan.Siggen10.8529 26.08.2020 26.08.2020 Show
Trojan.DownLoader34.28307 26.08.2020 26.08.2020 Show
Trojan.MulDrop13.46590 26.08.2020 26.08.2020 Show
Trojan.MulDrop13.46566 26.08.2020 26.08.2020 Show
Trojan.DownLoader34.28045 26.08.2020 26.08.2020 Show
Exploit.Siggen2.23896 26.08.2020 26.08.2020 Show
Trojan.Siggen10.8511 26.08.2020 26.08.2020 Show
Trojan.DownLoader34.28166 26.08.2020 26.08.2020 Show
Trojan.DownLoader34.28434 26.08.2020 26.08.2020 Show
Trojan.Inject3.53081 26.08.2020 26.08.2020 Show
Trojan.MulDrop13.45716 26.08.2020 26.08.2020 Show
Trojan.PWS.Siggen2.53931 26.08.2020 26.08.2020 Show
Trojan.Siggen10.8660 26.08.2020 26.08.2020 Show
Trojan.Siggen10.8498 26.08.2020 26.08.2020 Show
Trojan.Siggen10.4748 26.08.2020 26.08.2020 Show
Exploit.Siggen2.27060 26.08.2020 26.08.2020 Show
Trojan.Siggen10.8845 26.08.2020 26.08.2020 Show
Trojan.MulDrop13.46815 26.08.2020 26.08.2020 Show
Trojan.KeyLogger.42834 26.08.2020 26.08.2020 Show
Exploit.Siggen2.27079 26.08.2020 26.08.2020 Show
Trojan.Siggen10.8682 26.08.2020 26.08.2020 Show
Trojan.DownLoader34.28199 26.08.2020 26.08.2020 Show
Exploit.Siggen2.27058 26.08.2020 26.08.2020 Show
Trojan.MulDrop13.46540 26.08.2020 26.08.2020 Show
Exploit.Siggen2.27092 26.08.2020 26.08.2020 Show
Trojan.MulDrop13.46786 26.08.2020 26.08.2020 Show
Trojan.DownLoader34.28222 26.08.2020 26.08.2020 Show
Trojan.MulDrop13.46569 26.08.2020 26.08.2020 Show
Trojan.DownLoader27.62929 26.08.2020 26.08.2020 Show
Trojan.Siggen10.8811 26.08.2020 26.08.2020 Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.