Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
XM.Robocop 16.02.2006 --- Show
XM.Sofa 16.02.2006 --- Show
XM.Soldier 16.02.2006 --- Show
XM.Spellcheck 16.02.2006 --- Show
XM.Tabej 16.02.2006 --- Show
XM.Tjoro 16.02.2006 --- Show
XM.Totaler 16.02.2006 --- Show
XM.Tstvr 16.02.2006 --- Show
XM.Uedasan 16.02.2006 --- Show
XM.Ultras 16.02.2006 --- Show
XM.Weit 16.02.2006 --- Show
XM.Yohimbe 16.02.2006 --- Show
XM.Zepast 16.02.2006 --- Show
XRCV.1060 16.02.2006 --- Show
XRCV.1072 16.02.2006 --- Show
XRCV.1134 16.02.2006 --- Show
XRCV.1172 16.02.2006 --- Show
XRCV.1183 16.02.2006 --- Show
XRCV.1208 16.02.2006 --- Show
XRCV.159 16.02.2006 --- Show
XRCV.255 16.02.2006 --- Show
XRCV.330 16.02.2006 --- Show
XRCV.346 16.02.2006 --- Show
XRCV.475 16.02.2006 --- Show
XRCV.562 16.02.2006 --- Show
XRCV.570 16.02.2006 --- Show
XRCV.571 16.02.2006 --- Show
XRCV.649 16.02.2006 --- Show
XRCV.670 16.02.2006 --- Show
XRCV.679 16.02.2006 --- Show
XRCV.711 16.02.2006 --- Show
XRCV.718 16.02.2006 --- Show
XRCV.745 16.02.2006 --- Show
XRCV.771 16.02.2006 --- Show
XRCV.773 16.02.2006 --- Show
XRCV.795 16.02.2006 --- Show
XRCV.827 16.02.2006 --- Show
XRCV.839 16.02.2006 --- Show
XRCV.897 16.02.2006 --- Show
XRCV.916 16.02.2006 --- Show
XRCV.986 16.02.2006 --- Show
XRCV.Anna.742 16.02.2006 --- Show
XRCV.Evul.805 16.02.2006 --- Show
XRCV.Ice.199 16.02.2006 --- Show
XRCV.Ice.224 16.02.2006 --- Show
XRCV.Ice.250 16.02.2006 --- Show
XRCV.Ice.441 16.02.2006 --- Show
XRCV.Ice.639 16.02.2006 --- Show
XRCV.Ice.743 16.02.2006 --- Show
XRCV.Joanna.942 16.02.2006 --- Show

1 2 3 4 5 ... 56271 56272 56273 56274 56275 56276

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

© Doctor Web
2003 — 2023

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies