Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
X97M.Sud 16.02.2006 --- Show
X97M.Sugar 16.02.2006 --- Show
X97M.Tabej 16.02.2006 --- Show
X97M.Tegrat 16.02.2006 --- Show
X97M.Teign 16.02.2006 --- Show
X97M.Tester 16.02.2006 --- Show
X97M.Tooth 16.02.2006 --- Show
X97M.Trash 16.02.2006 --- Show
X97M.Vapour 16.02.2006 --- Show
X97M.VCode 16.02.2006 --- Show
X97M.VCX 16.02.2006 --- Show
X97M.Vovan 16.02.2006 --- Show
X97M.War 16.02.2006 --- Show
X97M.Xal 16.02.2006 --- Show
X97M.Xif 16.02.2006 --- Show
Xavier.404 16.02.2006 --- Show
XaXa.594 16.02.2006 --- Show
Xexexe.5120 16.02.2006 --- Show
XF.Crazh 16.02.2006 --- Show
XF.Paix 16.02.2006 --- Show
XF.Semanggi 16.02.2006 --- Show
XF.Sic 16.02.2006 --- Show
XF.Who 16.02.2006 --- Show
Xianchi.561 16.02.2006 --- Show
Xmas.600 16.02.2006 --- Show
Xmas.722 16.02.2006 --- Show
Xmas.868 16.02.2006 --- Show
XM.Cauli 16.02.2006 --- Show
XM.Compat 16.02.2006 --- Show
XM.Dado 16.02.2006 --- Show
XM.Delta 16.02.2006 --- Show
XM.Disaster 16.02.2006 --- Show
XM.DMV 16.02.2006 --- Show
XM.Don 16.02.2006 --- Show
XM.Emperor 16.02.2006 --- Show
XM.Extras 16.02.2006 --- Show
XM.Fatum 16.02.2006 --- Show
XM.Fin 16.02.2006 --- Show
XM.HideMod 16.02.2006 --- Show
XM.Hit 16.02.2006 --- Show
XM.Laroux 16.02.2006 --- Show
XM.Lavista 16.02.2006 --- Show
XM.Legend 16.02.2006 --- Show
XM.LMV 16.02.2006 --- Show
Xmm.1107 16.02.2006 --- Show
XM.Neg 16.02.2006 --- Show
XM.Ninja 16.02.2006 --- Show
XM.NoMercy 16.02.2006 --- Show
XM.Pth 16.02.2006 --- Show
X-Mrei.1405 16.02.2006 --- Show

1 2 3 4 5 ... 56271 56272 56273 56274 56275 56276

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

© Doctor Web
2003 — 2023

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies