Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
X97M.Poorboy 16.02.2006 --- Show
X97M.Ramboo 16.02.2006 --- Show
X97M.Rawo 16.02.2006 --- Show
X97M.Remeel 16.02.2006 --- Show
X97M.Reten 16.02.2006 --- Show
X97M.Riots 16.02.2006 --- Show
X97M.Robocop 16.02.2006 --- Show
X97M.Sel 16.02.2006 --- Show
X97M.Sifa 16.02.2006 --- Show
X97M.Slacker 16.02.2006 --- Show
X97M.Soldier 16.02.2006 --- Show
X97M.Sorry 16.02.2006 --- Show
X97M.Spell 16.02.2006 --- Show
X97M.Spellcheck 16.02.2006 --- Show
X97M.Squared 16.02.2006 --- Show
X97M.Stick 16.02.2006 --- Show
X97M.Sud 16.02.2006 --- Show
X97M.Sugar 16.02.2006 --- Show
X97M.Tabej 16.02.2006 --- Show
X97M.Tegrat 16.02.2006 --- Show
X97M.Teign 16.02.2006 --- Show
X97M.Tester 16.02.2006 --- Show
X97M.Tooth 16.02.2006 --- Show
X97M.Trash 16.02.2006 --- Show
X97M.Vapour 16.02.2006 --- Show
X97M.VCode 16.02.2006 --- Show
X97M.VCX 16.02.2006 --- Show
X97M.Vovan 16.02.2006 --- Show
X97M.War 16.02.2006 --- Show
X97M.Xal 16.02.2006 --- Show
X97M.Xif 16.02.2006 --- Show
Xavier.404 16.02.2006 --- Show
XaXa.594 16.02.2006 --- Show
Xexexe.5120 16.02.2006 --- Show
XF.Crazh 16.02.2006 --- Show
XF.Paix 16.02.2006 --- Show
XF.Semanggi 16.02.2006 --- Show
XF.Sic 16.02.2006 --- Show
XF.Who 16.02.2006 --- Show
Xianchi.561 16.02.2006 --- Show
Xmas.600 16.02.2006 --- Show
Xmas.722 16.02.2006 --- Show
Xmas.868 16.02.2006 --- Show
XM.Cauli 16.02.2006 --- Show
XM.Compat 16.02.2006 --- Show
XM.Dado 16.02.2006 --- Show
XM.Delta 16.02.2006 --- Show
XM.Disaster 16.02.2006 --- Show
XM.DMV 16.02.2006 --- Show
XM.Don 16.02.2006 --- Show

1 2 3 4 5 ... 57391 57392 57393 57394 57395 57396

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.