Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
W97M.Stat 16.02.2006 --- Show
W97M.Stars 16.02.2006 --- Show
W97M.Stamp 16.02.2006 --- Show
W97M.SN 16.02.2006 --- Show
W97M.SMDM 16.02.2006 --- Show
W97M.Simulec 16.02.2006 --- Show
W97M.Sad 16.02.2006 --- Show
W97M.Rousted 16.02.2006 --- Show
W97M.RecCode 16.02.2006 --- Show
W97M.Tron 16.02.2006 --- Show
W97M.PAIN 16.02.2006 --- Show
W97M.Opener 16.02.2006 --- Show
Trojan.Plus 16.02.2006 --- Show
W97M.NoPrint 16.02.2006 --- Show
W97M.Muna 16.02.2006 --- Show
W97M.Model 16.02.2006 --- Show
W97M.Minimal 16.02.2006 --- Show
W97M.Lueno 16.02.2006 --- Show
W97M.LSD 16.02.2006 --- Show
W97M.Lebone 16.02.2006 --- Show
W97M.LeftNo 16.02.2006 --- Show
W97M.Inexist 16.02.2006 --- Show
W97M.Garble 16.02.2006 --- Show
W97M.Soob 16.02.2006 --- Show
W97M.Hope 16.02.2006 --- Show
W97M.Hill 16.02.2006 --- Show
W97M.Energy 16.02.2006 --- Show
W97M.Vivian 16.02.2006 --- Show
W97M.Fatal 16.02.2006 --- Show
W97M.Erq 16.02.2006 --- Show
W97M.Erab 16.02.2006 --- Show
W97M.Ella 16.02.2006 --- Show
W97M.Elf 16.02.2006 --- Show
W97M.Draw 16.02.2006 --- Show
W97M.Deldoc 16.02.2006 --- Show
W97M.Gedzac 16.02.2006 --- Show
W97M.Cypher 16.02.2006 --- Show
W97M.CopyTest 16.02.2006 --- Show
W97M.CopyMe 16.02.2006 --- Show
W97M.Comment 16.02.2006 --- Show
W97M.Codigo 16.02.2006 --- Show
V5M.Vision 16.02.2006 --- Show
W97M.Cham 16.02.2006 --- Show
W97M.Brain 16.02.2006 --- Show
W97M.Vamp 16.02.2006 --- Show
W97M.Baloon 16.02.2006 --- Show
W97M.AntiSocial 16.02.2006 --- Show
W97M.Ami 16.02.2006 --- Show
W97M.Alive 16.02.2006 --- Show
Trojan.Advice 16.02.2006 --- Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.