The page may not load correctly.
Defend what you create
Other Resources
a non-signature anti-virus
1,65 Euro/month
1,3 Euro/month
0.90 EURO/month
10 EURO/month
Via provider
Via social media
Via bank and payment systems
Via cellular service providers
Via IT service suppliers
All malware is created to commit crimes. What’s important to hackers is doing harm, causing damage, and the criminal earnings that result from those activities.
Find out more
Read the Anti-virus Times columns "Online banking" and "Banknote thieves" to learn how cybercriminals use malicious programs and social engineering techniques to try to steal money.
With the help of social-engineering techniques, scammers deceive Internet users by playing on their curiosity, weaknesses, and carelessness. And Dr.Web protects users against scammers, using its entire array of anti-virus technologies.
Find out more
Read the Anti-virus Times columns "Con artists" and "Caught" to learn how cybercriminals use malicious programs and social-engineering techniques to try to worm their way into people’s confidence and make them willingly engage in whatever actions they need them to undertake.
Vulnerabilities exist in every piece of software. This fact is well known to hackers, which is why they create exploits—special codes that exploit vulnerabilities to deliver malicious applications into a system or steal information. Cybercriminals most frequently exploit vulnerabilities in popular browsers, Adobe applications, and Office systems. Any software has loopholes. Zero-day vulnerabilities—those vulnerabilities not yet known to either software developers or even anti-viruses—are particularly dangerous.
Just one example!
In May 2017, during a virus outbreak, WannaCry exploited vulnerabilities in the SMB v1-3 protocol. Dr.Web detected the Trojan as soon as systems came under attack even though it had not yet been added to the Dr.Web virus database. WannaCry was stopped by the Dr.Web heuristic analyser which has been perfected and upgraded since 1994. No Dr.Web user’s data was compromised.
Find out more
Read the Anti-virus Times columns "Con artists" and "Caught" to learn how cybercriminals use malicious programs and social-engineering techniques to try to worm their way into people’s confidence and make them willingly engage in whatever actions they need them to undertake.
Each of us values the fruits of our labours and our family photos and movies. But for hackers, such files are their key to getting rich.
Find out more
Read the Anti-virus Times column "Persona (non)grata" to learn how cybercriminals profit off of user data and what malicious programs they use for this purpose.
Dr.Web believes: A computer should serve its user rather than invisible intruders who can utilise the machine's resources remotely for their shady dealings. That’s why Dr.Web developers pay a lot of attention to providing protection against hijacking and spying.
Find out more
Read the Anti-virus Times columns "Spies are everywhere" and "Botology basics" to learn how cybercriminals try to steal money and spy on users with the help of malicious programs.
Children constitute a special group of Internet users that is most at risk due to inexperience, credulity, curiosity, and other age-related qualities. Therefore, the ways of protecting children on the Internet are special too.
Find out more
Read the Anti-virus Times columns "Snared in the net", "Web psychology", and "Kids’ web 2.0" to learn how the cyber world of a child is fragile in our hi-tech era and why it needs parental protection.
Dr.Web Security Space provides sufficient protection for safe web surfing.
Only if users do not lower their Dr.Web protection level (by disabling or suspending a module’s operation, lowering the protection level for the Preventive Protection component for short-term convenience, etc.).
Operating system | Windows | macOS | Linux |
---|---|---|---|
Anti-virus Blocks viruses and malware from accessing the protected system and will cure the malicious programs that have already penetrated it. |
+ | + | + |
HTTP monitor SpIDer Gate Scans web pages in real time and blocks access to dangerous sites, such as those used for phishing attacks. |
+ | + | + |
Anti-spam Detects spam and other unsolicited messages in any language, with next to zero false positives. |
+ | - | - |
Parental control Blocks access to websites by URL keywords and protects children from exposure to objectionable web content. The “restrict access” feature protects information located on removable data-storage devices and in files and directories from unauthorised access, theft, and deletion. |
+ | - | - |
Firewall An impenetrable barrier to hackers attempting to break into your system. |
+ | - | - |
Exploit Prevention Protects against malicious objects that take advantage of software flaws in popular applications. |
+ | - | - |
Ransomware Protection Trojan-encoder protection based on behavioural rules for programs of this kind. |
+ | - | - |
Data Loss Prevention Continuously protects files in user-selected folders from unauthorised modification or deletion (disabled by default). |
+ | - | - |
Privacy Blocks a device’s camera and microphone to prevent unauthorised audio and video recordings. |
+ | - | - |
Removable device access control Blocks access to removable media: flash drives and any other USB device, including webcams, cameras and portable media players. |
+ | - | - |
Dr.Web Cloud Checks URLs on Doctor Web's server in real time. |
+ | - | - |
Windows* | macOS | Linux | Android и Android TV |
---|---|---|---|
10/8.1/8/7 |
10.7 + |
2.6.37 and later, glibc от 2.13 and later |
4.0+ |
* Dr.Web version 11.5 supports Windows XP. This version can be downloaded in the Download Wizard. A trial is not available for version 11.5. More
Compare
with Dr.Web Anti-virus (anti-virus and firewall only)