Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Trojan.DownLoader33.52539 12.06.2020 12.06.2020 Show
Trojan.DownLoader33.52504 12.06.2020 12.06.2020 Show
Trojan.Inject3.41741 12.06.2020 12.06.2020 Show
Exploit.Siggen2.3696 12.06.2020 12.06.2020 Show
Trojan.Inject3.41666 12.06.2020 12.06.2020 Show
Exploit.Siggen2.4211 12.06.2020 12.06.2020 Show
Trojan.DownLoader33.52912 12.06.2020 12.06.2020 Show
Trojan.Hosts.47696 12.06.2020 12.06.2020 Show
Exploit.Siggen2.3816 12.06.2020 12.06.2020 Show
Trojan.DownLoader33.52522 12.06.2020 12.06.2020 Show
Trojan.DownLoader33.52729 12.06.2020 12.06.2020 Show
Trojan.Siggen9.53282 12.06.2020 12.06.2020 Show
Trojan.MulDrop13.1419 12.06.2020 12.06.2020 Show
Trojan.DownLoader33.52487 12.06.2020 12.06.2020 Show
Exploit.Siggen2.3807 12.06.2020 12.06.2020 Show
Exploit.Siggen2.3800 12.06.2020 12.06.2020 Show
Exploit.Siggen2.4137 12.06.2020 12.06.2020 Show
Trojan.Siggen9.52939 12.06.2020 12.06.2020 Show
Trojan.PWS.Steam.18306 12.06.2020 12.06.2020 Show
Trojan.DownLoader33.52849 12.06.2020 12.06.2020 Show
Exploit.Siggen2.4155 12.06.2020 12.06.2020 Show
Trojan.DownLoader33.52773 12.06.2020 12.06.2020 Show
Exploit.Siggen2.4193 12.06.2020 12.06.2020 Show
Trojan.DownLoader33.52967 12.06.2020 12.06.2020 Show
Trojan.DownLoader33.52798 12.06.2020 12.06.2020 Show
Trojan.MulDrop13.1403 12.06.2020 12.06.2020 Show
Trojan.DownLoader33.52294 12.06.2020 12.06.2020 Show
Trojan.DownLoader33.52646 12.06.2020 12.06.2020 Show
Trojan.DownLoader33.52909 12.06.2020 12.06.2020 Show
Trojan.DownLoader33.52651 12.06.2020 12.06.2020 Show
Exploit.Siggen2.4043 12.06.2020 12.06.2020 Show
Exploit.Siggen2.4213 12.06.2020 12.06.2020 Show
Trojan.MulDrop13.1380 12.06.2020 12.06.2020 Show
Trojan.DownLoader33.52331 12.06.2020 12.06.2020 Show
Trojan.MulDrop13.1432 12.06.2020 12.06.2020 Show
Trojan.PWS.Siggen.15072 12.06.2020 12.06.2020 Show
Exploit.Siggen2.3793 12.06.2020 12.06.2020 Show
Exploit.Siggen2.3886 12.06.2020 12.06.2020 Show
Trojan.DownLoader33.52787 12.06.2020 12.06.2020 Show
Trojan.Inject3.41792 12.06.2020 12.06.2020 Show
Trojan.DownLoader33.52731 12.06.2020 12.06.2020 Show
Exploit.Siggen2.4102 12.06.2020 12.06.2020 Show
Trojan.MulDrop13.1398 12.06.2020 12.06.2020 Show
Exploit.Siggen2.3874 12.06.2020 12.06.2020 Show
Trojan.Siggen9.53101 12.06.2020 12.06.2020 Show
Trojan.Inject3.41623 12.06.2020 12.06.2020 Show
Exploit.Siggen2.4214 12.06.2020 12.06.2020 Show
Trojan.Inject3.42015 12.06.2020 12.06.2020 Show
Trojan.DownLoader33.52296 12.06.2020 12.06.2020 Show
Exploit.Siggen2.3985 12.06.2020 12.06.2020 Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.