Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Trojan.Click.716 16.02.2006 --- Show
Trojan.Click.527 16.02.2006 --- Show
Trojan.Aries 16.02.2006 --- Show
Trojan.Aequitas 16.02.2006 --- Show
TornSpy.4336 16.02.2006 --- Show
Munya.3025 16.02.2006 --- Show
IRC.Tarako 16.02.2006 --- Show
IRC.Generic.133 16.02.2006 --- Show
FDOS.Autobot 16.02.2006 --- Show
Exploit.MozillaBO 16.02.2006 --- Show
Exploit.Iobjsafe 16.02.2006 --- Show
Exploit.Formpaste 16.02.2006 --- Show
Exploit.DCom.32 16.02.2006 --- Show
Exploit.Ccerror 16.02.2006 --- Show
Adware.SiteHistory 16.02.2006 --- Show
Adware.PeerNet 16.02.2006 --- Show
Adware.Bazooka 16.02.2006 --- Show
Adware.Akpz 16.02.2006 --- Show
Dialer.Snow 16.02.2006 --- Show
BackDoor.Vidsrv 16.02.2006 --- Show
BackDoor.Trick 16.02.2006 --- Show
BackDoor.Ralpha 16.02.2006 --- Show
BackDoor.Punctes 16.02.2006 --- Show
BackDoor.Netwall 16.02.2006 --- Show
BackDoor.Mrobe 16.02.2006 --- Show
BackDoor.IRC.Rator 16.02.2006 --- Show
BackDoor.IRC.Pakauk 16.02.2006 --- Show
BackDoor.Iprip.3 16.02.2006 --- Show
BackDoor.Generic.1140 16.02.2006 --- Show
BackDoor.Generic.1102 16.02.2006 --- Show
BackDoor.ColdFusion.13 16.02.2006 --- Show
BackDoor.Cigi.18 16.02.2006 --- Show
BackDoor.Btftp 16.02.2006 --- Show
Alive.dropper.3800 16.02.2006 --- Show
Milan.289 16.02.2006 --- Show
DDoS.Script 16.02.2006 --- Show
Dialer.Area 16.02.2006 --- Show
Win32.HLLM.Bugbear 16.02.2006 27.04.2005 Show
Trojan.Inject.28 16.02.2006 --- Show
Trojan.MulDrop.591 16.02.2006 --- Show
BackDoor.Scriper 16.02.2006 --- Show
Trojan.MulDrop.2632 16.02.2006 --- Show
Win32.HLLM.Netsky.17408 16.02.2006 27.04.2005 Show
VBS.Generic.306 16.02.2006 --- Show
Trojan.MulDrop.1890 16.02.2006 --- Show
Trojan.MulDrop.1933 16.02.2006 --- Show
Win32.HLLM.Netsky.22016 16.02.2006 08.03.2004 Show
Win32.HLLM.Netsky.18348 16.02.2006 27.04.2005 Show
Win32.HLLM.Darkprof 16.02.2006 27.04.2005 Show
Win32.HLLM.MyDoom.44544 16.02.2006 27.04.2005 Show

1 2 3 4 5 ... 85407 85408 85409 85410 85411 85412

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.