Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Trojan.StartPage.597 16.02.2006 --- Show
Trojan.StartPage.596 16.02.2006 --- Show
Zombie.3592 16.02.2006 --- Show
Zombie.dropper.3592 16.02.2006 --- Show
Bumblebee.1635 16.02.2006 --- Show
UUWorm.417 16.02.2006 --- Show
SPL.Generic 16.02.2006 --- Show
Trojan.Tiran.1372 16.02.2006 --- Show
SME.Demo.1976 16.02.2006 --- Show
SMEG.Duwende.2513 16.02.2006 --- Show
RPME.Trivial.1368 16.02.2006 --- Show
Rideon.4292 16.02.2006 --- Show
Zibit.dropper.1692 16.02.2006 --- Show
Zibit.dropper.1646 16.02.2006 --- Show
Yazz.924 16.02.2006 --- Show
SME.Oprobe.5288 16.02.2006 --- Show
MME.based 16.02.2006 --- Show
Mad.dropper.5011 16.02.2006 --- Show
NEP.LaDiosa.2361 16.02.2006 --- Show
Khizhnjak.449 16.02.2006 --- Show
HLLW.Dikshew.10691 16.02.2006 --- Show
Trojan.Coff 16.02.2006 --- Show
RSE.based 16.02.2006 --- Show
Trojan.Subcr 16.02.2006 --- Show
Trojan.Attack 16.02.2006 --- Show
BAT.Dikshew.415 16.02.2006 --- Show
CVME.Olga.1274 16.02.2006 --- Show
SUPD.Cryptor.3728 16.02.2006 --- Show
SABV.Generator 16.02.2006 --- Show
VCL.Eddie.1019 16.02.2006 --- Show
Dialer.Depuis 16.02.2006 --- Show
Dialer.Kirk 16.02.2006 --- Show
Dialer.Live 16.02.2006 --- Show
Trojan.DownLoader.5750 16.02.2006 --- Show
Dialer.Dating 16.02.2006 --- Show
Adware.Funbox 16.02.2006 --- Show
Trojan.DownLoader.5873 16.02.2006 --- Show
Dialer.Trust 16.02.2006 --- Show
Dialer.Holisty 16.02.2006 --- Show
Trojan.MulDrop.2501 16.02.2006 --- Show
Trojan.DownLoader.3004 16.02.2006 --- Show
Dialer.Joggy 16.02.2006 --- Show
Dialer.Linea 16.02.2006 --- Show
Trojan.DownLoader.3334 16.02.2006 --- Show
Adware.PornTool 16.02.2006 --- Show
Trojan.Click.631 16.02.2006 --- Show
Adware.SunInfo 16.02.2006 --- Show
Trojan.DownLoader.1163 16.02.2006 --- Show
Dialer.MicroFlat 16.02.2006 --- Show
Dialer.Isp 16.02.2006 --- Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.