Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
AntiFortran.1725 16.02.2006 --- Show
BackSlash 16.02.2006 --- Show
AntiEXE.dropper 16.02.2006 --- Show
Aeta.5315 16.02.2006 --- Show
Aeta.5161 16.02.2006 --- Show
Antibase.1900 16.02.2006 --- Show
CivilWar.AntiDAF.542 16.02.2006 --- Show
Curepa.666 16.02.2006 --- Show
Int13h.AntiCpav.2061 16.02.2006 --- Show
HLLP.AntiCom.8359 16.02.2006 --- Show
Trojan.AntiLame 16.02.2006 --- Show
AntiCMOS.726 16.02.2006 --- Show
Anticad.4096 16.02.2006 --- Show
Jerusalem.Invader 16.02.2006 --- Show
Anticad.3012 16.02.2006 --- Show
Jerusalem.2225 16.02.2006 --- Show
AntiCachacha.400 16.02.2006 --- Show
AntiBasic.351 16.02.2006 --- Show
Trojan.AntiAVP.6672 16.02.2006 --- Show
AntiAVP.959 16.02.2006 --- Show
AntiAVP.1235 16.02.2006 --- Show
AntiAVP.1183 16.02.2006 --- Show
AntiAVP.989 16.02.2006 --- Show
AntiArj.977 16.02.2006 --- Show
ExeHeader.AntiArj.348 16.02.2006 --- Show
ExeHeader.AntiArj.333 16.02.2006 --- Show
Pixel.Hydra.2300 16.02.2006 --- Show
AntiMIT.dropper.773 16.02.2006 --- Show
AntiMIT.773 16.02.2006 --- Show
AntiMIT.770 16.02.2006 --- Show
AntiMIT.764 16.02.2006 --- Show
Glemp.877 16.02.2006 --- Show
AntiAznar.664 16.02.2006 --- Show
Anti-AV.839 16.02.2006 --- Show
AntiTrace.1946 16.02.2006 --- Show
AntiSabados.815 16.02.2006 --- Show
AntiFortran.1110 16.02.2006 --- Show
AntiAznar.666 16.02.2006 --- Show
Jodt.667 16.02.2006 --- Show
Anthrax 16.02.2006 --- Show
Anston.2169 16.02.2006 --- Show
Manic.2143 16.02.2006 --- Show
A-Bomb.730 16.02.2006 --- Show
Trivial.Ansi.881 16.02.2006 --- Show
MPC.AnotherWorld 16.02.2006 --- Show
Kim.1000 16.02.2006 --- Show
Annyit.656 16.02.2006 --- Show
Aniver.507 16.02.2006 --- Show
VCS.866 16.02.2006 --- Show
Annihilator.based 16.02.2006 --- Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.