Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Vlad.Sly 16.02.2006 --- Show
Vlad.Systa 16.02.2006 --- Show
Vlad.Systa.352 16.02.2006 --- Show
Vlad.Tasha.2042 16.02.2006 --- Show
Vlad.Vip.2697 16.02.2006 --- Show
VME.1792 16.02.2006 --- Show
VME.896 16.02.2006 --- Show
VME.Demo.1030 16.02.2006 --- Show
VME.Demo.1810 16.02.2006 --- Show
Vnu.539 16.02.2006 --- Show
Vodka.551 16.02.2006 --- Show
Vodka.560 16.02.2006 --- Show
Voice.1495 16.02.2006 --- Show
Voice.1500 16.02.2006 --- Show
Vole.based 16.02.2006 --- Show
Volga.1 16.02.2006 --- Show
Volga.2 16.02.2006 --- Show
Volga.3 16.02.2006 --- Show
Volga.4 16.02.2006 --- Show
Volga.5 16.02.2006 --- Show
Volga.6 16.02.2006 --- Show
Volga.7 16.02.2006 --- Show
Volk.460 16.02.2006 --- Show
Voodoo 16.02.2006 --- Show
Voodoo.3081 16.02.2006 --- Show
Voodoo.3117 16.02.2006 --- Show
Voodoo.3662 16.02.2006 --- Show
Voodoo.3666 16.02.2006 --- Show
Voodoo.3764 16.02.2006 --- Show
Voronezh.1536 16.02.2006 --- Show
Voronezh.1584 16.02.2006 --- Show
Voronezh.1600 16.02.2006 --- Show
Voronezh.370 16.02.2006 --- Show
Voronezh.600 16.02.2006 --- Show
Voronezh.650 16.02.2006 --- Show
Vortex.based 16.02.2006 --- Show
Vota.591 16.02.2006 --- Show
Vote.1000 16.02.2006 --- Show
Voyager.1134 16.02.2006 --- Show
Voyager.508 16.02.2006 --- Show
VP.909 16.02.2006 --- Show
Vpk.1430 16.02.2006 --- Show
Vrag.396 16.02.2006 --- Show
Vriest.1280 16.02.2006 --- Show
VRN.2229 16.02.2006 --- Show
VRN.2276 16.02.2006 --- Show
VRN.2284 16.02.2006 --- Show
VS.1000 16.02.2006 --- Show
VS.1536 16.02.2006 --- Show
VS.1726 16.02.2006 --- Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.