Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Trojan.DownLoader.6236 16.02.2006 --- Show
Trojan.DownLoader.6337 16.02.2006 --- Show
Trojan.DownLoader.6212 16.02.2006 --- Show
Trojan.DownLoader.5756 16.02.2006 --- Show
Trojan.DownLoader.6262 16.02.2006 --- Show
Trojan.DownLoader.6125 16.02.2006 --- Show
Trojan.DownLoader.6103 16.02.2006 --- Show
Trojan.DownLoader.5190 16.02.2006 --- Show
Trojan.MulDrop.3054 16.02.2006 --- Show
Trojan.DownLoader.4759 16.02.2006 --- Show
Trojan.Qqmall 16.02.2006 --- Show
Trojan.DownLoader.5434 16.02.2006 --- Show
Trojan.Click.837 16.02.2006 --- Show
Trojan.DownLoader.6474 16.02.2006 --- Show
Trojan.DownLoader.6287 16.02.2006 --- Show
Trojan.DownLoader.5689 16.02.2006 --- Show
Trojan.DownLoader.6190 16.02.2006 --- Show
Trojan.DownLoader.6180 16.02.2006 --- Show
Trojan.DownLoader.4955 16.02.2006 --- Show
Trojan.DownLoader.6582 16.02.2006 --- Show
Trojan.DownLoader.1863 16.02.2006 --- Show
Trojan.MulDrop.2796 16.02.2006 --- Show
Trojan.DownLoader.5863 16.02.2006 --- Show
Trojan.DownLoader.6090 16.02.2006 --- Show
Trojan.DownLoader.6091 16.02.2006 --- Show
Trojan.StartPage.1198 16.02.2006 --- Show
Trojan.DownLoader.6213 16.02.2006 --- Show
Trojan.DownLoader.6188 16.02.2006 --- Show
Trojan.DownLoader.6088 16.02.2006 --- Show
Trojan.MulDrop.3176 16.02.2006 --- Show
Trojan.DownLoader.5864 16.02.2006 --- Show
Trojan.DownLoader.6074 16.02.2006 --- Show
Trojan.DownLoader.6018 16.02.2006 --- Show
Trojan.DownLoader.6072 16.02.2006 --- Show
Trojan.DownLoader.5500 16.02.2006 --- Show
Trojan.DownLoader.6010 16.02.2006 --- Show
Trojan.DownLoader.6033 16.02.2006 --- Show
Trojan.Click.820 16.02.2006 --- Show
Trojan.DownLoader.6059 16.02.2006 --- Show
Trojan.DownLoader.6310 16.02.2006 --- Show
Trojan.DownLoader.4857 16.02.2006 --- Show
Trojan.MulDrop.3152 16.02.2006 --- Show
Trojan.DownLoader.6571 16.02.2006 --- Show
Trojan.MulDrop.3140 16.02.2006 --- Show
Trojan.MulDrop.3139 16.02.2006 --- Show
Trojan.DownLoader.6063 16.02.2006 --- Show
Trojan.DownLoader.6046 16.02.2006 --- Show
Trojan.DownLoader.5971 16.02.2006 --- Show
Trojan.MulDrop.3154 16.02.2006 --- Show
Trojan.DownLoader.6022 16.02.2006 --- Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.