Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Eddie.Alexander.1951 16.02.2006 --- Show
Eddie.Alexander.1843 16.02.2006 --- Show
Alex.818 16.02.2006 --- Show
Alex.599 16.02.2006 --- Show
Alex.368 16.02.2006 --- Show
Alex.1287 16.02.2006 --- Show
AlexSolo.512 16.02.2006 --- Show
Ale.1911 16.02.2006 --- Show
MrTwister.675 16.02.2006 --- Show
Dith.1502 16.02.2006 --- Show
Alcom.257 16.02.2006 --- Show
Int13h.Paraguay.2189 16.02.2006 --- Show
Albania.1991 16.02.2006 --- Show
Albania.429 16.02.2006 --- Show
Albania.575 16.02.2006 --- Show
Albania.506 16.02.2006 --- Show
Albania.606 16.02.2006 --- Show
Alarm.1820 16.02.2006 --- Show
Mf.6047 16.02.2006 --- Show
Mf.5088 16.02.2006 --- Show
Mf.4873 16.02.2006 --- Show
Mf.4625 16.02.2006 --- Show
Mf.4270 16.02.2006 --- Show
Aladdin.2293 16.02.2006 --- Show
Alabama.1560 16.02.2006 --- Show
Alabama.dropper.1560 16.02.2006 --- Show
WpcBats.2279 16.02.2006 --- Show
Al.797 16.02.2006 --- Show
Kuku.886 16.02.2006 --- Show
Kuku.1111 16.02.2006 --- Show
Trivial.858 16.02.2006 --- Show
Trivial.1027 16.02.2006 --- Show
Trojan.AKill.61368 16.02.2006 --- Show
AK.251 16.02.2006 --- Show
Int13h.Paraguay.1650 16.02.2006 --- Show
Dead.852 16.02.2006 --- Show
DrS.678 16.02.2006 --- Show
Aiw.572 16.02.2006 --- Show
NRLG.1270 16.02.2006 --- Show
Airwalker.based 16.02.2006 --- Show
Airdef.999 16.02.2006 --- Show
Aircop.dropper 16.02.2006 --- Show
Aircop 16.02.2006 --- Show
Vlad.HD35 16.02.2006 --- Show
Fog.AirRaid.330 16.02.2006 --- Show
Ailbone.1536 16.02.2006 --- Show
Auspar.1014 16.02.2006 --- Show
Auspar.972 16.02.2006 --- Show
Aussie.322 16.02.2006 --- Show
Auspar.823 16.02.2006 --- Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.