Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Trojan.DownLoader.5136 16.02.2006 --- Show
Trojan.DownLoader.3997 16.02.2006 --- Show
Trojan.DownLoader.5127 16.02.2006 --- Show
Trojan.DownLoader.3994 16.02.2006 --- Show
Trojan.DownLoader.3996 16.02.2006 --- Show
Trojan.DownLoader.3998 16.02.2006 --- Show
Trojan.DownLoader.4011 16.02.2006 --- Show
Trojan.DownLoader.4908 16.02.2006 --- Show
Trojan.DownLoader.4304 16.02.2006 --- Show
Trojan.DownLoader.3804 16.02.2006 --- Show
Trojan.DownLoader.4010 16.02.2006 --- Show
Trojan.DownLoader.3803 16.02.2006 --- Show
Trojan.DownLoader.3802 16.02.2006 --- Show
Trojan.DownLoader.5253 16.02.2006 --- Show
Trojan.DownLoader.3693 16.02.2006 --- Show
Trojan.DownLoader.3892 16.02.2006 --- Show
Trojan.DownLoader.5140 16.02.2006 --- Show
Trojan.DownLoader.3529 16.02.2006 --- Show
Trojan.DownLoader.3530 16.02.2006 --- Show
Trojan.DownLoader.3564 16.02.2006 --- Show
Trojan.DownLoader.3483 16.02.2006 --- Show
Trojan.PWS.Banker.857 16.02.2006 --- Show
Trojan.DownLoader.3471 16.02.2006 --- Show
Trojan.DownLoader.3931 16.02.2006 --- Show
Trojan.DownLoader.5147 16.02.2006 --- Show
Trojan.DownLoader.3518 16.02.2006 --- Show
Trojan.DownLoader.3439 16.02.2006 --- Show
Trojan.DownLoader.3413 16.02.2006 --- Show
Trojan.DownLoader.3416 16.02.2006 --- Show
Trojan.DownLoader.3350 16.02.2006 --- Show
Trojan.DownLoader.5146 16.02.2006 --- Show
Trojan.DownLoader.3889 16.02.2006 --- Show
Trojan.PWS.Banker.885 16.02.2006 --- Show
Trojan.DownLoader.3433 16.02.2006 --- Show
Trojan.DownLoader.5718 16.02.2006 --- Show
Trojan.DownLoader.5142 16.02.2006 --- Show
Trojan.DownLoader.3431 16.02.2006 --- Show
Trojan.DownLoader.4163 16.02.2006 --- Show
Trojan.DownLoader.3525 16.02.2006 --- Show
Trojan.DownLoader.4894 16.02.2006 --- Show
Trojan.DownLoader.5143 16.02.2006 --- Show
Trojan.DownLoader.5235 16.02.2006 --- Show
Trojan.DownLoader.3437 16.02.2006 --- Show
Trojan.DownLoader.5151 16.02.2006 --- Show
Trojan.DownLoader.3625 16.02.2006 --- Show
Trojan.DownLoader.5218 16.02.2006 --- Show
Trojan.DownLoader.2452 16.02.2006 --- Show
Trojan.DownLoader.3415 16.02.2006 --- Show
Trojan.DownLoader.4335 16.02.2006 --- Show
Trojan.DownLoader.4162 16.02.2006 --- Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.