Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Soldier.611 16.02.2006 --- Show
Soldier.545 16.02.2006 --- Show
Matter.744 16.02.2006 --- Show
Soldier.1480 16.02.2006 --- Show
Solar.98 16.02.2006 --- Show
Solar.140 16.02.2006 --- Show
Solar.125 16.02.2006 --- Show
Solar.123 16.02.2006 --- Show
Olivia.3378 16.02.2006 --- Show
Solar.122 16.02.2006 --- Show
Solar.103 16.02.2006 --- Show
Solar.102 16.02.2006 --- Show
Solar.100 16.02.2006 --- Show
Solar.512 16.02.2006 --- Show
Dyslexia.2000 16.02.2006 --- Show
Sojourn.1369 16.02.2006 --- Show
Neron.1590 16.02.2006 --- Show
Neron.1020 16.02.2006 --- Show
Sofiterm.899 16.02.2006 --- Show
Sofiterm.887 16.02.2006 --- Show
Sofiterm.839 16.02.2006 --- Show
Sofiterm.1487 16.02.2006 --- Show
Sofiterm.1393 16.02.2006 --- Show
Sofiterm.1369 16.02.2006 --- Show
Sofa.666 16.02.2006 --- Show
Socks.439 16.02.2006 --- Show
Odious.569 16.02.2006 --- Show
Sochi.703 16.02.2006 --- Show
Socha.753 16.02.2006 --- Show
Sh.988 16.02.2006 --- Show
Sh.973 16.02.2006 --- Show
Sh.841 16.02.2006 --- Show
Sh.254 16.02.2006 --- Show
Nutcracker.Snowfall.945 16.02.2006 --- Show
BAT.Snotkop.479 16.02.2006 --- Show
Trojan.Snooby.24778 16.02.2006 --- Show
Sniper 16.02.2006 --- Show
Gorilla 16.02.2006 --- Show
Snark.819 16.02.2006 --- Show
Snafu.based 16.02.2006 --- Show
Smvb.708 16.02.2006 --- Show
Smvb.1100 16.02.2006 --- Show
Smvb.1023 16.02.2006 --- Show
Smut.938 16.02.2006 --- Show
Trojan.Smut.938 16.02.2006 --- Show
Smoker.631 16.02.2006 --- Show
Smoka.1024 16.02.2006 --- Show
Smiley 16.02.2006 --- Show
Smiley.1983 16.02.2006 --- Show
Smile.5376 16.02.2006 --- Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.