Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Steryd.399 16.02.2006 --- Show
Sterculius.based 16.02.2006 --- Show
Sterculius.440 16.02.2006 --- Show
Sterculius.412 16.02.2006 --- Show
Sterculius.280 16.02.2006 --- Show
Sterculius.273 16.02.2006 --- Show
Sterculius.240 16.02.2006 --- Show
Sterculius.266 16.02.2006 --- Show
Riot.Creeper.472 16.02.2006 --- Show
Steppen.428 16.02.2006 --- Show
Stepped.1000 16.02.2006 --- Show
Steel.427 16.02.2006 --- Show
Steel.407 16.02.2006 --- Show
Steel.266 16.02.2006 --- Show
Steel.257 16.02.2006 --- Show
Trivial.Steel.136 16.02.2006 --- Show
Steatoda.1623 16.02.2006 --- Show
Steatoda.1455 16.02.2006 --- Show
StealthBoot 16.02.2006 --- Show
Stdemo.803 16.02.2006 --- Show
Dead.1119 16.02.2006 --- Show
IVP.Sh.924 16.02.2006 --- Show
Trojan.HellBell.1810 16.02.2006 --- Show
StayCool.573 16.02.2006 --- Show
Witcode.1728 16.02.2006 --- Show
Start.2200 16.02.2006 --- Show
Starship 16.02.2006 --- Show
Starship.2632 16.02.2006 --- Show
Stardot.979 16.02.2006 --- Show
Unholy.900 16.02.2006 --- Show
Amz.789 16.02.2006 --- Show
Stardot.801 16.02.2006 --- Show
Stardot.682 16.02.2006 --- Show
Stardot.600 16.02.2006 --- Show
Starcon.1057 16.02.2006 --- Show
Star.486 16.02.2006 --- Show
BootExe.Stalker.328 16.02.2006 --- Show
BootExe.Stalker.310 16.02.2006 --- Show
Stalker.1254 16.02.2006 --- Show
Stahlpl.750 16.02.2006 --- Show
Staf.2083 16.02.2006 --- Show
Sstr.717 16.02.2006 --- Show
Trivial.Sst.56 16.02.2006 --- Show
SillyC.517 16.02.2006 --- Show
Sstr.736 16.02.2006 --- Show
Ssr.1945 16.02.2006 --- Show
Ssi.1428 16.02.2006 --- Show
Ssi.1410 16.02.2006 --- Show
Ssi.1377 16.02.2006 --- Show
SSH.2974 16.02.2006 --- Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.