Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Stupid.1355 16.02.2006 --- Show
Estonia.666 16.02.2006 --- Show
Stuff.624 16.02.2006 --- Show
Trojan.Gds.20550 16.02.2006 --- Show
Student.776 16.02.2006 --- Show
Sw.504 16.02.2006 --- Show
Stsv.200 16.02.2006 --- Show
Pixel.173 16.02.2006 --- Show
Stryke.263 16.02.2006 --- Show
Stryke.254 16.02.2006 --- Show
Stryke.253 16.02.2006 --- Show
Strooboks.2767 16.02.2006 --- Show
Strike.461 16.02.2006 --- Show
Strike 16.02.2006 --- Show
Int13h.Strato.1597 16.02.2006 --- Show
Stratosfer.388 16.02.2006 --- Show
Stratosfer.375 16.02.2006 --- Show
Stratosfer.372 16.02.2006 --- Show
Stranger.734 16.02.2006 --- Show
Strange 16.02.2006 --- Show
Nomad.1302 16.02.2006 --- Show
Storyteller.3184 16.02.2006 --- Show
Storm.based 16.02.2006 --- Show
Manitoba 16.02.2006 --- Show
Aragon 16.02.2006 --- Show
TurboBasic 16.02.2006 --- Show
Rostov.dropper 16.02.2006 --- Show
Stoned.dropper 16.02.2006 --- Show
Scrollock 16.02.2006 --- Show
Million 16.02.2006 --- Show
Murgas 16.02.2006 --- Show
NearDark 16.02.2006 --- Show
ArcHub 16.02.2006 --- Show
Vaucher 16.02.2006 --- Show
Stoned 16.02.2006 --- Show
Kampana 16.02.2006 --- Show
Inferno 16.02.2006 --- Show
Stinkfoot.1283 16.02.2006 --- Show
Stinkfoot.1251 16.02.2006 --- Show
Stinkfoot.1254 16.02.2006 --- Show
Dikshew.Stinger 16.02.2006 --- Show
Foma.972 16.02.2006 --- Show
Foma.1900 16.02.2006 --- Show
Foma.1733 16.02.2006 --- Show
Foma.1200 16.02.2006 --- Show
Foma.1000 16.02.2006 --- Show
Stimp.248 16.02.2006 --- Show
Sticks.438 16.02.2006 --- Show
Sticks.432 16.02.2006 --- Show
SillyRCE.422 16.02.2006 --- Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.