Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
WM.Quevi 16.02.2006 --- Show
WM.Quick 16.02.2006 --- Show
WM.Ramses 16.02.2006 --- Show
WM.Randomic 16.02.2006 --- Show
WM.Rapi 16.02.2006 --- Show
WM.Reflex 16.02.2006 --- Show
WM.Regbomb 16.02.2006 --- Show
WM.Rehenes 16.02.2006 --- Show
WM.Rhappy 16.02.2006 --- Show
WM.Safwan 16.02.2006 --- Show
WM.Sam 16.02.2006 --- Show
WM.Satanic 16.02.2006 --- Show
WM.Saver 16.02.2006 --- Show
WM.Saving 16.02.2006 --- Show
WM.SBVM 16.02.2006 --- Show
WM.Schoo 16.02.2006 --- Show
WM.Screw 16.02.2006 --- Show
WM.SetMode 16.02.2006 --- Show
WM.Shadow 16.02.2006 --- Show
WM.ShareFun 16.02.2006 --- Show
WM.Showofxx 16.02.2006 --- Show
WM.Shuffle 16.02.2006 --- Show
WM.Sig 16.02.2006 --- Show
WM.Silly 16.02.2006 --- Show
WM.Silvina 16.02.2006 --- Show
WM.Simple 16.02.2006 --- Show
WM.Since 16.02.2006 --- Show
WM.Skammy 16.02.2006 --- Show
WM.Slow 16.02.2006 --- Show
WM.Smiley 16.02.2006 --- Show
WM.Smmd 16.02.2006 --- Show
WM.Snickers 16.02.2006 --- Show
WM.Softwar 16.02.2006 --- Show
WM.Sok 16.02.2006 --- Show
WM.Spell 16.02.2006 --- Show
WM.Spooky 16.02.2006 --- Show
WM.Spy 16.02.2006 --- Show
WM.Stall 16.02.2006 --- Show
WM.Stryx 16.02.2006 --- Show
WM.Stupid 16.02.2006 --- Show
WM.Sunbeam 16.02.2006 --- Show
WM.Supers 16.02.2006 --- Show
WM.Surabaya 16.02.2006 --- Show
WM.Sveta 16.02.2006 --- Show
WMSVG.Generator 16.02.2006 --- Show
WM.Switch 16.02.2006 --- Show
WM.Swlabs 16.02.2006 --- Show
WM.Tabula 16.02.2006 --- Show
WM.Taguchi 16.02.2006 --- Show
WM.Talon 16.02.2006 --- Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.