Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
SSH.2770 16.02.2006 --- Show
Dows.2304 16.02.2006 --- Show
Srp.2380 16.02.2006 --- Show
Srp.2296 16.02.2006 --- Show
Srp.2248 16.02.2006 --- Show
Unerdov.2241 16.02.2006 --- Show
Clogg.524 16.02.2006 --- Show
TPVO.Glacier.1180 16.02.2006 --- Show
Squeaker.1091 16.02.2006 --- Show
Squawk.852 16.02.2006 --- Show
Squad.1299 16.02.2006 --- Show
SQL.953 16.02.2006 --- Show
Spy.447 16.02.2006 --- Show
ExeHeader.TheSpy.176 16.02.2006 --- Show
ExeHeader.Spy.176 16.02.2006 --- Show
Spy.1089 16.02.2006 --- Show
Trivial.4095 16.02.2006 --- Show
Trident.4095 16.02.2006 --- Show
Trojan.Springfield 16.02.2006 --- Show
Spring.768 16.02.2006 --- Show
Spring.640 16.02.2006 --- Show
Frizer.997 16.02.2006 --- Show
Frizer.798 16.02.2006 --- Show
Ontario.512 16.02.2006 --- Show
Spooky.841 16.02.2006 --- Show
Spooky.735 16.02.2006 --- Show
Spooky.716 16.02.2006 --- Show
Spooky.571 16.02.2006 --- Show
Spooky.522 16.02.2006 --- Show
Spooky.509 16.02.2006 --- Show
Spooky.398 16.02.2006 --- Show
Spooky.393 16.02.2006 --- Show
Spooky.392 16.02.2006 --- Show
IVP.323 16.02.2006 --- Show
Alive.3400 16.02.2006 --- Show
Alive.4000 16.02.2006 --- Show
Alive.3800 16.02.2006 --- Show
Split.250 16.02.2006 --- Show
Spirit 16.02.2006 --- Show
Spinner.1068 16.02.2006 --- Show
Babol.3072 16.02.2006 --- Show
Spice.2123 16.02.2006 --- Show
Spice.1440 16.02.2006 --- Show
Spic.999 16.02.2006 --- Show
Spic.990 16.02.2006 --- Show
Sphinx.2751 16.02.2006 --- Show
Sphinx.Boot.2751 16.02.2006 --- Show
Ivan.895 16.02.2006 --- Show
Sperm.844 16.02.2006 --- Show
LoveMe.804 16.02.2006 --- Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.