Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
WM.Niknat 16.02.2006 --- Show
WM.NJ-DLK 16.02.2006 --- Show
WM.No-F 16.02.2006 --- Show
WM.Nomej 16.02.2006 --- Show
WM.NoMercy 16.02.2006 --- Show
WM.Noodle 16.02.2006 --- Show
WM.Nop 16.02.2006 --- Show
WM.NoPrint 16.02.2006 --- Show
WM.Nova 16.02.2006 --- Show
WM.NPad 16.02.2006 --- Show
WM.NPoly 16.02.2006 --- Show
WM.Nuclear 16.02.2006 --- Show
WM.Oblom 16.02.2006 --- Show
WM.Ochoy 16.02.2006 --- Show
WM.OldPad 16.02.2006 --- Show
WM.Onyx 16.02.2006 --- Show
WM.Ordo 16.02.2006 --- Show
WM.Orhey 16.02.2006 --- Show
WM.Outlaw 16.02.2006 --- Show
WM.Oval 16.02.2006 --- Show
WM.Over 16.02.2006 --- Show
WM.Padania 16.02.2006 --- Show
WM.Paper 16.02.2006 --- Show
WM.Parol 16.02.2006 --- Show
WM.Pcw 16.02.2006 --- Show
WM.Pejuang 16.02.2006 --- Show
WM.Pelo 16.02.2006 --- Show
WM.Percent 16.02.2006 --- Show
WM.Pesan 16.02.2006 --- Show
WM.Phantom 16.02.2006 --- Show
WM.Phardera 16.02.2006 --- Show
WM.Pig 16.02.2006 --- Show
WM.Pirata 16.02.2006 --- Show
WM.Plushad 16.02.2006 --- Show
WM.Polite 16.02.2006 --- Show
WM.President 16.02.2006 --- Show
WM.Primit 16.02.2006 --- Show
WM.Prizm 16.02.2006 --- Show
WM.Puritan 16.02.2006 --- Show
WM.Pwd 16.02.2006 --- Show
WM.Query 16.02.2006 --- Show
WM.Quevi 16.02.2006 --- Show
WM.Quick 16.02.2006 --- Show
WM.Ramses 16.02.2006 --- Show
WM.Randomic 16.02.2006 --- Show
WM.Rapi 16.02.2006 --- Show
WM.Reflex 16.02.2006 --- Show
WM.Regbomb 16.02.2006 --- Show
WM.Rehenes 16.02.2006 --- Show
WM.Rhappy 16.02.2006 --- Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.