Mi biblioteca
Mi biblioteca

+ Añadir a la biblioteca

Soporte
Soporte 24 horas | Normas de contactar

Sus solicitudes

Perfil

Biblioteca de virus

El análisis de tecnologías usadas por los malintencionados nos permite sacar conclusiones sobre los posibles vectores de desarrollo de la industria antivirus y afrontar las futuras amenazas con mayor eficacia. Entérese de cómo funcionan varios programas nocivos en sistemas infectados y cómo afrontarlo.

Generic BackDoor.c aliases:

Name Vendor Dr.Web classification name
Generic BackDoor.c McAfee Trojan.Proxy.146
Generic BackDoor.c McAfee Trojan.Proxy.25
Generic BackDoor.c McAfee DDoS.Attack.origin
Generic BackDoor.c McAfee Trojan.Proxy.403
Generic BackDoor.c McAfee Trojan.Proxy.377
Generic BackDoor.c McAfee Trojan.Click.278
Generic BackDoor.c McAfee Trojan.KeyLogger.203
Generic BackDoor.c McAfee BackDoor.NetContr.30
Generic BackDoor.c McAfee Trojan.PWS.Kyrgyz.27
Generic BackDoor.c McAfee BackDoor.IrcContact.20
Generic BackDoor.c McAfee BackDoor.Jacktron
Generic BackDoor.c McAfee BackDoor.IRC.Microji
Generic BackDoor.c McAfee BackDoor.Geek
Generic BackDoor.c McAfee BackDoor.Cupsy
Generic BackDoor.c McAfee Trojan.Jiospy
Generic BackDoor.c McAfee Trojan.Proxy.435
Generic BackDoor.c McAfee Trojan.Proxy.408
Generic BackDoor.c McAfee BackDoor.Gosbel
Generic BackDoor.c McAfee BackDoor.Matrix.30
Generic BackDoor.c McAfee BackDoor.SevenEleven
Generic BackDoor.c McAfee Trojan.Proxy.229
Generic BackDoor.c McAfee Trojan.DownLoader.4678
Generic BackDoor.c McAfee BackDoor.IRC.Transistor
Generic BackDoor.c McAfee BackDoor.Evils.1
Generic BackDoor.c McAfee BackDoor.Evils.11
Generic BackDoor.c McAfee BackDoor.Superman
Generic BackDoor.c McAfee Trojan.PWS.Fox
Generic BackDoor.c McAfee BackDoor.Chock
Generic BackDoor.c McAfee BackDoor.Leviat
Generic BackDoor.c McAfee BackDoor.Srvlite
Generic BackDoor.c McAfee Trojan.Click.302
Generic BackDoor.c McAfee BackDoor.Incred
Generic BackDoor.c McAfee Trojan.Proxy.316
Generic BackDoor.c McAfee Trojan.Popuper
Generic BackDoor.c McAfee Trojan.PWS.Legmir.411
Generic BackDoor.c McAfee Trojan.Proxy.489
Generic BackDoor.c McAfee Trojan.Proxy.462
Generic BackDoor.c McAfee Trojan.DownLoader.2491
Generic BackDoor.c McAfee BackDoor.Sms
Generic BackDoor.c McAfee DDoS.Attack.128
Generic BackDoor.c McAfee Trojan.CnIM
Generic BackDoor.c McAfee Trojan.Ports
Generic BackDoor.c McAfee BackDoor.Bybyte
Generic BackDoor.c McAfee Trojan.Proxy.702
Generic BackDoor.c McAfee Trojan.PWS.Zhui
Generic BackDoor.c McAfee Trojan.Proxy.660
Generic BackDoor.c McAfee DDoS.Attack.129
Generic BackDoor.c McAfee BackDoor.Krlua
Generic BackDoor.c McAfee BackDoor.Trover
Generic BackDoor.c McAfee BackDoor.Furax

1 2 3 4

Vulnerabilidades para Android

Según las estadísticas, cada quinto programa para el SO Android tiene vulnerabilidades, lo cual les permite a los malintencionados implementar los troyanos móviles en el dispositivo y realizar las acciones necesarias.

Auditor de seguridad en Dr.Web para Android diagnosticará y analizará la seguridad de un dispositivo móvil, ofrecerá soluciones para resolver los problemas y las vulnerabilidades encontrados.