Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Cry.30577 16.02.2006 --- Show
Arianna.3426 16.02.2006 --- Show
Arianna.3375 16.02.2006 --- Show
Arianna.3076 16.02.2006 --- Show
Arianna.2864 16.02.2006 --- Show
RiverCo.2956 16.02.2006 --- Show
Arg.1206 16.02.2006 --- Show
Arequipa.1994 16.02.2006 --- Show
Areopag.480 16.02.2006 --- Show
Aref.890 16.02.2006 --- Show
Aref.670 16.02.2006 --- Show
AreThree.2048 16.02.2006 --- Show
XRCV.570 16.02.2006 --- Show
XRCV.571 16.02.2006 --- Show
XRCV.562 16.02.2006 --- Show
XRCV.346 16.02.2006 --- Show
XRCV.1208 16.02.2006 --- Show
XRCV.Scroll.800 16.02.2006 --- Show
XRCV.1172 16.02.2006 --- Show
XRCV.255 16.02.2006 --- Show
XRCV.718 16.02.2006 --- Show
XRCV.986 16.02.2006 --- Show
Ice.734 16.02.2006 --- Show
XRCV.Ice.639 16.02.2006 --- Show
XRCV.Ice.250 16.02.2006 --- Show
XRCV.839 16.02.2006 --- Show
XRCV.670 16.02.2006 --- Show
Scythe.dropper 16.02.2006 --- Show
Scythe 16.02.2006 --- Show
HiDos.dropper 16.02.2006 --- Show
XRCV.1183 16.02.2006 --- Show
XRCV.Anna.742 16.02.2006 --- Show
XRCV.Ice.743 16.02.2006 --- Show
XRCV.773 16.02.2006 --- Show
XRCV.330 16.02.2006 --- Show
XRCV.1060 16.02.2006 --- Show
Archinf 16.02.2006 --- Show
Arara.1375 16.02.2006 --- Show
Arara.1391 16.02.2006 --- Show
Arara.1043 16.02.2006 --- Show
Arara.1042 16.02.2006 --- Show
Arara.1038 16.02.2006 --- Show
Arara.dropper.1040 16.02.2006 --- Show
Arara.1040 16.02.2006 --- Show
Arale.1526 16.02.2006 --- Show
Aragorn.1522 16.02.2006 --- Show
Arab.834 16.02.2006 --- Show
Trojan.QFyre 16.02.2006 --- Show
Trojan.Beazly 16.02.2006 --- Show
Trojan.April 16.02.2006 --- Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.