Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
BackDoor.Pigeon.5737 14.08.2007 --- Show
Trojan.DownLoader.30049 14.08.2007 --- Show
Trojan.DownLoader.30231 14.08.2007 --- Show
Trojan.Click.3841 14.08.2007 --- Show
Trojan.Click.3776 14.08.2007 --- Show
BackDoor.Pigeon.5881 14.08.2007 --- Show
Trojan.DownLoader.30214 14.08.2007 --- Show
Trojan.DownLoader.29951 14.08.2007 --- Show
Trojan.Click.3985 14.08.2007 --- Show
Trojan.Click.3954 14.08.2007 --- Show
BackDoor.Pigeon.5682 14.08.2007 --- Show
Trojan.DownLoader.29794 14.08.2007 --- Show
Trojan.Click.3691 14.08.2007 --- Show
BackDoor.Pigeon.5708 14.08.2007 --- Show
Trojan.MulDrop.8286 14.08.2007 --- Show
Trojan.MulDrop.8296 14.08.2007 --- Show
Trojan.Proxy.2041 14.08.2007 --- Show
Trojan.Click.3698 14.08.2007 --- Show
Trojan.Goner.58 14.08.2007 --- Show
Trojan.PWS.Banker.11165 14.08.2007 --- Show
Trojan.PWS.Qqpass.1211 14.08.2007 --- Show
Trojan.DownLoader.29846 14.08.2007 --- Show
Trojan.Click.3855 14.08.2007 --- Show
Trojan.Click.3925 14.08.2007 --- Show
BackDoor.Zani.169 14.08.2007 --- Show
Trojan.DownLoader.30026 14.08.2007 --- Show
Trojan.Click.3956 14.08.2007 --- Show
Trojan.Click.3635 14.08.2007 --- Show
Trojan.DownLoader.29933 14.08.2007 --- Show
Trojan.PWS.Banker.11153 14.08.2007 --- Show
Trojan.Click.3662 14.08.2007 --- Show
BackDoor.Pigeon.5800 14.08.2007 --- Show
Trojan.Click.3714 14.08.2007 --- Show
Trojan.MulDrop.8279 14.08.2007 --- Show
BackDoor.Pigeon.5681 14.08.2007 --- Show
Trojan.PWS.Banker.11064 14.08.2007 --- Show
Trojan.Click.3735 14.08.2007 --- Show
Trojan.DownLoader.30052 14.08.2007 --- Show
Trojan.Click.3640 14.08.2007 --- Show
Trojan.Click.3921 14.08.2007 --- Show
Trojan.Click.3744 14.08.2007 --- Show
Trojan.DownLoader.29962 14.08.2007 --- Show
Trojan.DownLoader.30087 14.08.2007 --- Show
Trojan.MulDrop.8302 14.08.2007 --- Show
Trojan.Click.3766 14.08.2007 --- Show
Trojan.Click.3902 14.08.2007 --- Show
Trojan.PWS.Banker.11096 14.08.2007 --- Show
BackDoor.Pigeon.5680 14.08.2007 --- Show
Trojan.Click.4008 14.08.2007 --- Show
Trojan.DownLoader.30004 14.08.2007 --- Show

1 2 3 4 5 ... 86487 86488 86489 86490 86491 86492

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.