Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Trojan.DownLoader.4193 16.02.2006 --- Show
Trojan.DownLoader.4257 16.02.2006 --- Show
Trojan.DownLoader.5141 16.02.2006 --- Show
Trojan.DownLoader.1008 16.02.2006 --- Show
Trojan.DownLoader.4907 16.02.2006 --- Show
Trojan.DownLoader.3190 16.02.2006 --- Show
Trojan.DownLoader.4724 16.02.2006 --- Show
Trojan.DownLoader.5934 16.02.2006 --- Show
Trojan.DownLoader.4673 16.02.2006 --- Show
Trojan.DownLoader.4490 16.02.2006 --- Show
Trojan.DownLoader.4548 16.02.2006 --- Show
Trojan.DownLoader.5052 16.02.2006 --- Show
Adware.BestOffers 16.02.2006 --- Show
Dialer.Teak 16.02.2006 --- Show
Trojan.DownLoader.3901 16.02.2006 --- Show
Trojan.Elitehide 16.02.2006 --- Show
Trojan.DownLoader.3738 16.02.2006 --- Show
Trojan.DownLoader.3877 16.02.2006 --- Show
Trojan.DownLoader.4595 16.02.2006 --- Show
Trojan.DownLoader.3515 16.02.2006 --- Show
Trojan.MulDrop.2496 16.02.2006 --- Show
Trojan.DownLoader.3481 16.02.2006 --- Show
Trojan.DownLoader.3635 16.02.2006 --- Show
Trojan.DownLoader.5215 16.02.2006 --- Show
Trojan.DownLoader.3441 16.02.2006 --- Show
Trojan.DownLoader.3995 16.02.2006 --- Show
Trojan.DownLoader.5149 16.02.2006 --- Show
Trojan.Click.750 16.02.2006 --- Show
Trojan.DownLoader.3040 16.02.2006 --- Show
Trojan.DownLoader.4112 16.02.2006 --- Show
Trojan.DownLoader.4252 16.02.2006 --- Show
Trojan.MulDrop.2010 16.02.2006 --- Show
Trojan.DownLoader.4456 16.02.2006 --- Show
Trojan.StartPage.120 16.02.2006 --- Show
Trojan.DownLoader.308 16.02.2006 --- Show
Trojan.StartPage.11552 16.02.2006 --- Show
Trojan.DownLoader.659 16.02.2006 --- Show
Trojan.MulDrop.1489 16.02.2006 --- Show
Trojan.MulDrop.1463 16.02.2006 --- Show
Trojan.DownLoader.2227 16.02.2006 --- Show
Trojan.KeyLogger.117 16.02.2006 --- Show
Trojan.DownLoader.1762 16.02.2006 --- Show
Trojan.DownLoader.1926 16.02.2006 --- Show
Trojan.MulDrop.1366 16.02.2006 --- Show
Trojan.DownLoader.5194 16.02.2006 --- Show
Trojan.StartPage.439 16.02.2006 --- Show
Trojan.DownLoader.1244 16.02.2006 --- Show
Trojan.DownLoader.4005 16.02.2006 --- Show
Trojan.DownLoader.1556 16.02.2006 --- Show
Trojan.DownLoader.1523 16.02.2006 --- Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.