Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
VRN.2229 16.02.2006 --- Show
VRN.2276 16.02.2006 --- Show
VRN.2284 16.02.2006 --- Show
VS.1000 16.02.2006 --- Show
VS.1536 16.02.2006 --- Show
VS.1726 16.02.2006 --- Show
VS.1776 16.02.2006 --- Show
VS.2790 16.02.2006 --- Show
VS.3000 16.02.2006 --- Show
VS.3300 16.02.2006 --- Show
VS.3900 16.02.2006 --- Show
VS.4000 16.02.2006 --- Show
VS.612 16.02.2006 --- Show
VS.621 16.02.2006 --- Show
VS.944 16.02.2006 --- Show
V-Sign 16.02.2006 --- Show
VSoft.655 16.02.2006 --- Show
VSP.443 16.02.2006 --- Show
VTech.Lunacy.2513 16.02.2006 --- Show
VTech.Lunacy.2865 16.02.2006 --- Show
VTG.2560 16.02.2006 --- Show
Vulcan.227 16.02.2006 --- Show
Vulcan.294 16.02.2006 --- Show
Vulcan.307 16.02.2006 --- Show
Vulcan.480 16.02.2006 --- Show
Vulcan.484 16.02.2006 --- Show
Vulcan.489 16.02.2006 --- Show
Vulcan.496 16.02.2006 --- Show
VVer.based 16.02.2006 --- Show
Vvs.1024 16.02.2006 --- Show
VWC.Generator 16.02.2006 --- Show
VWE.Generator 16.02.2006 --- Show
Vxh.322 16.02.2006 --- Show
Vxh.462 16.02.2006 --- Show
Vxt.550 16.02.2006 --- Show
W97M.Acid 16.02.2006 --- Show
W97M.Adnerb 16.02.2006 --- Show
W97M.Adren 16.02.2006 --- Show
W97M.Afeto 16.02.2006 --- Show
W97M.Agent 16.02.2006 --- Show
W97M.Aida 16.02.2006 --- Show
W97M.Akuma 16.02.2006 --- Show
W97M.Alamat 16.02.2006 --- Show
W97M.Alarm 16.02.2006 --- Show
W97M.Alcopaul 16.02.2006 --- Show
W97M.Aleja 16.02.2006 --- Show
W97M.Alergia 16.02.2006 --- Show
W97M.Alicia 16.02.2006 --- Show
W97M.Alina 16.02.2006 --- Show
W97M.Alive 16.02.2006 --- Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.