Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Trojan.DownLoader.12467 31.08.2006 --- Show
Trojan.DownLoader.12468 31.08.2006 --- Show
VBS.Leslie 31.08.2006 --- Show
VirusConstructor.Bodex 31.08.2006 --- Show
Trojan.DownLoader.12462 31.08.2006 --- Show
Trojan.Proxy.1072 31.08.2006 --- Show
Trojan.Proxy.1071 31.08.2006 --- Show
Trojan.KillFiles.585 31.08.2006 --- Show
Trojan.DownLoader.12464 31.08.2006 --- Show
Trojan.PWS.Banker.4894 30.08.2006 --- Show
Trojan.PWS.Banker.4895 30.08.2006 --- Show
Trojan.PWS.Banker.4893 30.08.2006 --- Show
BackDoor.IRC.Sdbot.785 30.08.2006 --- Show
Trojan.DownLoader.12460 30.08.2006 --- Show
Trojan.PWS.LDPinch.168 30.08.2006 --- Show
BackDoor.Pigeon.342 30.08.2006 --- Show
Trojan.PWS.Banker.4891 30.08.2006 --- Show
Trojan.DownLoader.12458 30.08.2006 --- Show
BackDoor.Haxdoor.341 30.08.2006 --- Show
BackDoor.Haxdoor.342 30.08.2006 --- Show
Trojan.PWS.Banker.4892 30.08.2006 --- Show
BackDoor.IRC.Sdbot.770 30.08.2006 --- Show
Trojan.DownLoader.12372 30.08.2006 --- Show
Trojan.Click.1398 30.08.2006 --- Show
Trojan.PWS.Qqpass.141 30.08.2006 --- Show
BackDoor.Haxdoor.330 30.08.2006 --- Show
Trojan.DownLoader.4208 30.08.2006 --- Show
Trojan.PWS.LDPinch.1127 30.08.2006 --- Show
BackDoor.CmjSpy.81 30.08.2006 --- Show
BackDoor.Haxdoor.329 30.08.2006 --- Show
Trojan.PWS.Banker.4890 30.08.2006 --- Show
BackDoor.Haxdoor.333 30.08.2006 --- Show
Trojan.DownLoader.12457 30.08.2006 --- Show
Trojan.PWS.Banker.4889 30.08.2006 --- Show
Trojan.DownLoader.12459 30.08.2006 --- Show
Trojan.DownLoader.12456 30.08.2006 --- Show
Trojan.DownLoader.12453 30.08.2006 --- Show
Trojan.PWS.Qqpass.163 30.08.2006 --- Show
Trojan.DownLoader.12454 30.08.2006 --- Show
Trojan.DownLoader.12449 30.08.2006 --- Show
BackDoor.Pigeon.432 30.08.2006 --- Show
Trojan.DownLoader.12450 30.08.2006 --- Show
Trojan.DownLoader.12451 30.08.2006 --- Show
Trojan.PWS.LDPinch.1126 30.08.2006 --- Show
VBS.Generic.303 30.08.2006 --- Show
BackDoor.IRC.Sdbot.784 30.08.2006 --- Show
Trojan.DownLoader.12448 30.08.2006 --- Show
Trojan.DownLoader.12445 30.08.2006 --- Show
Trojan.DownLoader.12447 30.08.2006 --- Show
Trojan.DownLoader.12444 30.08.2006 --- Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.