Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Annihilator.based 16.02.2006 --- Show
Annihilator.383 16.02.2006 --- Show
VCS.807 16.02.2006 --- Show
AVCS.276 16.02.2006 --- Show
SillyC.283 16.02.2006 --- Show
Trivial.Anjo.700 16.02.2006 --- Show
Animo.518 16.02.2006 --- Show
Animals.2400 16.02.2006 --- Show
Animality.1974 16.02.2006 --- Show
Angry.393 16.02.2006 --- Show
Trojan.Angriff.5581 16.02.2006 --- Show
SillyOR.395 16.02.2006 --- Show
Trojan.Angelus 16.02.2006 --- Show
Angelina 16.02.2006 --- Show
Angela.2204 16.02.2006 --- Show
Angela.2314 16.02.2006 --- Show
Angela.2347 16.02.2006 --- Show
Angela.2165 16.02.2006 --- Show
Angela.2164 16.02.2006 --- Show
Angel.661 16.02.2006 --- Show
Angel.1571 16.02.2006 --- Show
Angarsk.238 16.02.2006 --- Show
Trojan.Andum.4016 16.02.2006 --- Show
Andryushka.3568 16.02.2006 --- Show
Andryushka.3536 16.02.2006 --- Show
Holiday.2900 16.02.2006 --- Show
Andromeda.713 16.02.2006 --- Show
Andromeda.661 16.02.2006 --- Show
Vanq.642 16.02.2006 --- Show
Andromeda.1140 16.02.2006 --- Show
Androide.995 16.02.2006 --- Show
Andromeda 16.02.2006 --- Show
Vecna.Android 16.02.2006 --- Show
Andris.843 16.02.2006 --- Show
Andris.683 16.02.2006 --- Show
Andris 16.02.2006 --- Show
Andrew 16.02.2006 --- Show
Lout.805 16.02.2006 --- Show
Andreas.1107 16.02.2006 --- Show
Andrey.932 16.02.2006 --- Show
Olivia.2152 16.02.2006 --- Show
Anarchy.9594 16.02.2006 --- Show
Anarchy.666 16.02.2006 --- Show
Anarchy.6503 16.02.2006 --- Show
Anarchy.3153 16.02.2006 --- Show
Anarchy.300 16.02.2006 --- Show
Rift.725 16.02.2006 --- Show
Amuck.3184 16.02.2006 --- Show
Amt.4000 16.02.2006 --- Show
Amt.3000 16.02.2006 --- Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.