Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Sperm.791 16.02.2006 --- Show
Sperm.718 16.02.2006 --- Show
Sperm.712 16.02.2006 --- Show
Trojan.SpeedModem 16.02.2006 --- Show
Caustic.907 16.02.2006 --- Show
Specified.2048 16.02.2006 --- Show
SPE.CyberWarrior.5300 16.02.2006 --- Show
Buggeroo.1300 16.02.2006 --- Show
Trojan.Gut.4672 16.02.2006 --- Show
Spartak.454 16.02.2006 --- Show
Spartak.367 16.02.2006 --- Show
Spartak.2000 16.02.2006 --- Show
Spartak.1100 16.02.2006 --- Show
Trivial.Spartak.110 16.02.2006 --- Show
Spartak.1000 16.02.2006 --- Show
HLLP.Spartak.6425 16.02.2006 --- Show
Sparse.3840 16.02.2006 --- Show
Cyanide.705 16.02.2006 --- Show
Spanz.639 16.02.2006 --- Show
Spanska.4270 16.02.2006 --- Show
Spanska.4250 16.02.2006 --- Show
Spanska.3698 16.02.2006 --- Show
Spanska.1509 16.02.2006 --- Show
Spanska.1500 16.02.2006 --- Show
Spanska.1474 16.02.2006 --- Show
Spanska.1120 16.02.2006 --- Show
Spanska.1008 16.02.2006 --- Show
Spanska.1000 16.02.2006 --- Show
Barrotes.1127 16.02.2006 --- Show
SpamAcid.Generator 16.02.2006 --- Show
Spaghetti.1259 16.02.2006 --- Show
Space.2001 16.02.2006 --- Show
Explorer.3063 16.02.2006 --- Show
SU.387 16.02.2006 --- Show
Sova.4060 16.02.2006 --- Show
HLLW.Lepha.32574 16.02.2006 --- Show
Friday13.408 16.02.2006 --- Show
Soupy.1073 16.02.2006 --- Show
Soupy.1072 16.02.2006 --- Show
Soupy.1001 16.02.2006 --- Show
Riot.Soulfly.2000 16.02.2006 --- Show
Soulburn.1509 16.02.2006 --- Show
ExeHeader.Sot 16.02.2006 --- Show
Sosun.232 16.02.2006 --- Show
Sorry.256 16.02.2006 --- Show
Sopromat.2165 16.02.2006 --- Show
Something.658 16.02.2006 --- Show
BAT.Soliton.394 16.02.2006 --- Show
Int13h.Soledad.1381 16.02.2006 --- Show
Int13h.Soledad.1077 16.02.2006 --- Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.