Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Suriv.1249 16.02.2006 --- Show
Suriv.897 16.02.2006 --- Show
Supra.95 16.02.2006 --- Show
Supra.173 16.02.2006 --- Show
Supra.172 16.02.2006 --- Show
Supra.149 16.02.2006 --- Show
Supra.136 16.02.2006 --- Show
Supervisor.2906 16.02.2006 --- Show
Supervisor.2221 16.02.2006 --- Show
Supervisor.1875 16.02.2006 --- Show
Supervisor.1256 16.02.2006 --- Show
Sina.1208 16.02.2006 --- Show
Jerk.1077 16.02.2006 --- Show
Super.Worm.393 16.02.2006 --- Show
Super.1175 16.02.2006 --- Show
SUPD.Cryptor.3278 16.02.2006 --- Show
SUPD.Voyager.3166 16.02.2006 --- Show
SUPD.Voyager.3049 16.02.2006 --- Show
SUPD.Cryptor.2582 16.02.2006 --- Show
SUPD.Cryptor.2169 16.02.2006 --- Show
Eblis.1150 16.02.2006 --- Show
Seeg.1357 16.02.2006 --- Show
SUPD.based 16.02.2006 --- Show
Suomi.1008 16.02.2006 --- Show
Sunset.1081 16.02.2006 --- Show
Sunset.1079 16.02.2006 --- Show
Sunset.1077 16.02.2006 --- Show
Sunny.2288 16.02.2006 --- Show
Sundevil.762 16.02.2006 --- Show
Sundevil.691 16.02.2006 --- Show
Sum.1441 16.02.2006 --- Show
Suleiman.692 16.02.2006 --- Show
SillyRE.611 16.02.2006 --- Show
Khizhnjak.based 16.02.2006 --- Show
Suit.1167 16.02.2006 --- Show
Suicide.544 16.02.2006 --- Show
Deicide.458 16.02.2006 --- Show
Vlad.Prodigy.393 16.02.2006 --- Show
Suicide.305 16.02.2006 --- Show
Suige.577 16.02.2006 --- Show
Suela.1042 16.02.2006 --- Show
Int13h.Sudamerica.1431 16.02.2006 --- Show
Suburbs.400 16.02.2006 --- Show
Suburbs.393 16.02.2006 --- Show
Cipher.653 16.02.2006 --- Show
Cipher.651 16.02.2006 --- Show
Stvar 16.02.2006 --- Show
DeadHead.992 16.02.2006 --- Show
Stupid.919 16.02.2006 --- Show
Stupid.583 16.02.2006 --- Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.