Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Exploit.DDay 16.02.2006 --- Show
Exploit.ViewSource 16.02.2006 --- Show
Trojan.MulDrop.1676 16.02.2006 --- Show
Trojan.DownLoader.2411 16.02.2006 --- Show
Exploit.GDesk 16.02.2006 --- Show
Exploit.FFox 16.02.2006 --- Show
Exploit.Favi 16.02.2006 --- Show
Trojan.MulDrop.912 16.02.2006 --- Show
Trojan.DownLoader.1789 16.02.2006 --- Show
Exploit.ShowHelp 16.02.2006 --- Show
Win32.HLLM.Fox.3 16.02.2006 --- Show
Win32.HLLP.STD 16.02.2006 --- Show
Win32.HLLM.Sydney 16.02.2006 --- Show
Worm.Flying 16.02.2006 --- Show
Trojan.DownLoader.1919 16.02.2006 --- Show
Trojan.MulDrop.2525 16.02.2006 --- Show
Trojan.MulDrop.2342 16.02.2006 --- Show
VBS.Triny 16.02.2006 --- Show
BAT.Higara 16.02.2006 --- Show
FDOS.Alanche 16.02.2006 --- Show
Flooder.Alanche.35 16.02.2006 --- Show
Flooder.Alanche 16.02.2006 --- Show
Flooder.Alanche.34 16.02.2006 --- Show
FDOS.Alanche.34 16.02.2006 --- Show
Trojan.Spth 16.02.2006 --- Show
DDoS.Syn 16.02.2006 --- Show
VirusConstructor.Tvbsg 16.02.2006 --- Show
Trojan.DownLoader.1603 16.02.2006 --- Show
Trojan.KeyLogger.297 16.02.2006 --- Show
Trojan.Zyxlove 16.02.2006 --- Show
Exploit.ActiveX 16.02.2006 --- Show
VirusConstructor.Davwormgen 16.02.2006 --- Show
Trojan.MulDrop.2246 16.02.2006 --- Show
BackDoor.Generic.1244 16.02.2006 --- Show
VirusConstructor.SHVK.13 16.02.2006 --- Show
VirusConstructor.SHVK.12 16.02.2006 --- Show
VirusConstructor.RAHC 16.02.2006 --- Show
VirusConstructor.OVCK 16.02.2006 --- Show
Nazi.VirusConstructor 16.02.2006 --- Show
DarkSlick.Generator 16.02.2006 --- Show
BVCK.Generator.8 16.02.2006 --- Show
BVCK.Generator.1 16.02.2006 --- Show
VirusConstructor.Ansibomb 16.02.2006 --- Show
BackDoor.Generic.1215 16.02.2006 --- Show
Trojan.KillFiles.476 16.02.2006 --- Show
BackDoor.IRC.Sdbot.88 16.02.2006 --- Show
BackDoor.Radmin.26 16.02.2006 --- Show
Trojan.MulDrop.1699 16.02.2006 --- Show
Tool.BrForce 16.02.2006 --- Show
BackDoor.Djlans 16.02.2006 --- Show

1 2 3 4 5 ... 85407 85408 85409 85410 85411 85412

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.