THREAT DESCRIPTIONS

Technical details and removal instructions for threats identified by Labs

Listed below are the most recently published Threat Descriptions, with technical details and removal instructions for threats that affect computers and mobile devices.

Submit a Sample

Suspect a file or URL was wrongly detected? Send it to our Labs for further analysis

Submit a Sample

Articles

What is a Trojan and why is it harmful? Learn more about trojans and how they work

Read More