Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Trojan.Isbar.365 16.02.2006 --- Show
Trojan.Isbar.348 16.02.2006 --- Show
Trojan.Isbar.392 16.02.2006 --- Show
Trojan.DownLoader.6536 16.02.2006 --- Show
Trojan.DownLoader.6116 16.02.2006 --- Show
Trojan.DownLoader.6404 16.02.2006 --- Show
Trojan.Proxy.666 16.02.2006 --- Show
Trojan.DownLoader.6492 16.02.2006 --- Show
Trojan.DownLoader.6515 16.02.2006 --- Show
Trojan.DownLoader.6500 16.02.2006 --- Show
Trojan.DownLoader.6493 16.02.2006 --- Show
Trojan.DownLoader.6171 16.02.2006 --- Show
Trojan.DownLoader.6094 16.02.2006 --- Show
Trojan.DownLoader.1382 16.02.2006 --- Show
Trojan.MulDrop.3257 16.02.2006 --- Show
Trojan.DownLoader.6382 16.02.2006 --- Show
Trojan.DownLoader.5847 16.02.2006 --- Show
Trojan.DownLoader.5762 16.02.2006 --- Show
BackDoor.Generic.1223 16.02.2006 --- Show
Trojan.MulDrop.2936 16.02.2006 --- Show
Trojan.DownLoader.5701 16.02.2006 --- Show
Trojan.DownLoader.5677 16.02.2006 --- Show
Trojan.DownLoader.5702 16.02.2006 --- Show
Trojan.DownLoader.5937 16.02.2006 --- Show
Trojan.DownLoader.5682 16.02.2006 --- Show
Trojan.MulDrop.3079 16.02.2006 --- Show
Trojan.DownLoader.4959 16.02.2006 --- Show
Trojan.DownLoader.5678 16.02.2006 --- Show
Trojan.DownLoader.5547 16.02.2006 --- Show
Trojan.DownLoader.5696 16.02.2006 --- Show
Trojan.DownLoader.4778 16.02.2006 --- Show
Trojan.DownLoader.6415 16.02.2006 --- Show
Trojan.DownLoader.5443 16.02.2006 --- Show
Trojan.DownLoader.6390 16.02.2006 --- Show
Trojan.DownLoader.5875 16.02.2006 --- Show
Trojan.DownLoader.5695 16.02.2006 --- Show
Trojan.MulDrop.3241 16.02.2006 --- Show
Trojan.DownLoader.6399 16.02.2006 --- Show
Trojan.DownLoader.6342 16.02.2006 --- Show
Trojan.DownLoader.5713 16.02.2006 --- Show
Trojan.DownLoader.6029 16.02.2006 --- Show
Trojan.MulDrop.3178 16.02.2006 --- Show
Trojan.DownLoader.6330 16.02.2006 --- Show
Trojan.DownLoader.5811 16.02.2006 --- Show
Trojan.DownLoader.5879 16.02.2006 --- Show
Trojan.DownLoader.6114 16.02.2006 --- Show
Trojan.MulDrop.3215 16.02.2006 --- Show
Trojan.DownLoader.6139 16.02.2006 --- Show
Trojan.DownLoader.5761 16.02.2006 --- Show
Trojan.Hooker.49 16.02.2006 --- Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.