Security Response

Our security research centers around the world provide unparalleled analysis of and protection from IT security threats that include malware, security risks, vulnerabilities, and spam.
Subscribe

A-Z Listing of Threats & Risks

The Threat Explorer is a comprehensive resource for daily, accurate and up-to-date information on the latest threats, risks and vulnerabilities.
Symantec Security Response threat writeups (76)
SeverityNameTypeDiscovered
E-FluHoax
EasyPassSecurity Assessment Tool
EasySpywareCleanerMisleading Application
EasySpywareKillerMisleading Application
eBookHoax
Eco.BVirus
Economic Slow Down HoaxHoax
Eddy.1386Virus05/21/2001
EdwinVirus
Eek (b)Virus03/27/2000
Eharm.225Virus07/31/2003
EIC.TrojanTrojan Horse06/28/2001
Eicar Test StringVirus
EKerberosMisleading Application
Elecciones 2000Hoax
ELECCIONES 2006Hoax03/27/2006
EliteProtectorMisleading Application
EmperorVirus
End_of.566Virus07/31/2001
EPOC.Alone.JokeJoke
EPOC.Disowner.JokeJoke
EPOC.Fake.JokeJoke
EPOC.FalseAlarm.JokeJoke
EPOC.Ghost.JokeJoke
EPOC.Lights.JokeJoke
EPOC.Nice.JokeJoke
EPOC.Sprite.JokeJoke
Ericsson Free Phone HoaxHoax08/10/2001
ErrCleanMisleading Application
ErrorDiggerMisleading Application
ErrorDoctorMisleading Application
ErrorInspectorMisleading Application
ErrorProtectorMisleading Application
ErrorRepairMisleading Application
ErrorSafeMisleading Application
EssentialSecProFraudMisleading Application
ETDScannerMisleading Application
Eumel.383Virus08/20/2001
EVIL THE CAT Virus HoaxHoax
Exe_Bug.AVirus
Exe_Bug.CVirus
Exe_Bug.HookerVirus
Exp.CVE-2013-3874Other10/02/2013
Exp.CVE-2013-3875Other10/04/2013
Exp.CVE-2013-3885Other10/04/2013
Exp.CVE-2013-3886Other10/08/2013
Exp.CVE-2013-3910Other07/30/2014
Exp.CVE-2013-3911Other10/31/2013
Exp.CVE-2013-3912Other10/31/2013
Exp.CVE-2013-3914Other11/01/2013
Exp.CVE-2013-3916Other11/01/2013
Exp.CVE-2014-0546Other08/22/2014
Exp.CVE-2014-0565Other10/20/2014
Exp.CVE-2014-056910/24/2014
Exp.CVE-2014-0577Trojan11/30/2014
Exp.CVE-2014-0588Trojan11/30/2014
Exp.CVE-2014-1762Trojan05/28/2014
Exp.CVE-2014-1765Other07/03/2014
Exp.CVE-2014-1785Trojan05/29/2014
Exp.CVE-2014-1805Trojan06/26/2014
Exp.CVE-2014-1815Trojan05/14/2014
Exp.CVE-2014-2797Other07/02/2014
Exp.CVE-2014-2801Other07/02/2014
Exp.CVE-2014-2804Other07/03/2014
Exp.CVE-2014-2820Other08/19/2014
Exp.CVE-2014-2823Other08/19/2014
Exp.CVE-2014-4057Other08/19/2014
Exp.CVE-2014-4114Other10/14/2014
Exp.CVE-2014-414810/28/2014
Exp.CVE-2014-633211/12/2014
Exp.CVE-2014-6352Trojan11/29/2014
Exp.CVE-2014-724711/06/2014
Exp.CVE-2014-8440Trojan11/30/2014
ExpertAntiVirusMisleading Application
ExpressAntiVirus2009Misleading Application
ExqWebSearchPotentially Unwanted App
Symantec AntiVirus detections (435)
(These threats are also detected by the latest Virus Definitions.)
E-Morph
E-Riluttanza
E-Riluttanza (x)
E-Riluttanza (x2)
E-Riluttanza.4223
Eader
Eader.2000
EAF.656
EAF.687
Ear
Ear.1024 (1)
Ear.1024 (2)
Ear.1253
Ear.1455
Ear.421
Ear.421(2)
Ear.443
Ear.443(2)
Ear.Homecoming
Ear.Job
Ear.Meml.449
Ear.Nuts
Ear.Pegg
Ear.Quake-o
Ear.Simplex
Ear.Suicide
Ear.Variant
Earh.1083
Earle
Earle.1431
Eastern Digital
Eastern Digital.B (x)
Eastern_Dig.1700
Eastern_Dig.1700 (x)
Eastern_Digital (x)
Easy.200 (1)
Easy.200.B
EasyRider.2108
Eat Screen Trojan
EAT Spice & Die (Gen1)
Eater.2125 (1)
Eater.2125 (2)
Eater.2125 (3)
Eater.2167
EB79 (b)
EB79 Dropper (1)
EB79 Dropper (2)
Ebbelwoi
Ebo.2079
Ebo.2079 (2)
Ebo.2398
Ebo.mp
Ebola.3000
Ebola.3000 (1)
Ebola.3000 (2)
Ebola.313
Ebola.378
Ebola.5415
Ebola.Reston.317
Echo
Echo.8176
Eclipse
Eco (b)
ECW-X
Eda.718
EDCT
EDD.1422
EDD.1457
EDD.1567
EDD.565
Eddie.II.A
Eddy.1309
Eddy.1316
Eddy.1316 (x)
EDDY.1326
Eddy.1326 (x)
Eddy.1333
Eddy.1333 (1)
Eddy.1444
Eddy.1463
Eddy.1478
EDDY.1482
Eddy.1482 (1)
Eddy.1500
Eddy.1534
Eddy.1542
EDDY.1551
Eddy.1567
Eddy.gen
Eddy.gen (2)
Eddy.gen (3)
Eddy.gen (x)
Edit.684
Editz.656
Editz.684
Editz.825
Editz.855
Edolan.832
EDV
Eek.B (b)
eem.103.a
eem.113
EFIL.300
Egg
Egg.833
EICAR Test String(new)
Eight Ball
Eight Ball (b)
Eight Tunes
Eight Tunes (x)
Eight Tunes.B
Eight Tunes.B (x)
Eka.4096
Eka.4096 (2)
Eka.4096 (3)
Eka.4096 (x)
Eko Terror
El.1824
Elben.100
Elben.103
Elben.103.b
Elben.107
Elben.300
Elben.301
Elben.353
Elben.354
ELCON.374
ELCON.424
Eldorado.2071
Eldorado.2072
Eldorado.2074
ElDorado.gf (3)
ElDorado.gr
ElDorado.gr (2)
Electro.1800
Eleet.726
ELENA.592
Elf
Elf.2647
Elf.2731
Elf.3290
Elf.3400
Elf.3458
Elf.3675
ElFla.1017
Elite.212
Elite.214
Eliza
Eliza.1282
Elmo.329
Elsa.857
Elvira.239
Elvira.239.b
Elvira.240
Elvis.1584
Em.1303
Em.1348
Emelie.ow.214
EMF.404
EMF.625 (1)
EMF.625 (2)
Emhaka.749
Emhaka.749.B
Emma.427
Emmie.2440 (1)
Emmie.2440 (2)
Emmie.2620 (1)
Emmie.2620 (2)
Emmie.2620 (3)
Emmie.2702 (1)
Emmie.2702 (2)
Emmie.2702 (3)
Emmie.2823 (1)
Emmie.2823 (2)
Emmie.2823 (3)
Emmie.3097 (1)
Emmie.3097 (2)
Emmie.3097 (3)
EMPIR.297
Empire
Empire Monkey.j
Empire.In_Love.A
Empire.Monkey.C (b)
Empire.Monkey.D (b)
EMSPE.int
Emulator.249
Encephalitis
End_of.773
End_of.783 (1)
End_of.783 (2)
Endo.2068
Endo.Boot
EndOne (Gen1)
Enemy Within
Energizer.706
Energy (b)
English Made
Enine.205
Enine.205.b
Enine.206
Enine.206.b
Enine.207
Enjoy.1667
Enmity.808
Enmity.808 (2)
Enmity.808 (3)
Enmity.843
Enola Gay.1183
Enola Gay.1183 (x)
Enola.1864
Enola.1864.B
Enola.2430
Enough.657
Enough.683
Enterprise
Entity.1986
Entwives.335
Epsilon.1498
Epsilon.513
Equals
Equals.2221 (1)
Equals.2221.B
Equals.2221.B (2)
Equus
Erase.669.B
Erdem.421
Erich.461
Erich.461 Dropper
Erin.407
Erin.407(1)
Erin.407(2)
Erin.883
Erin.883(1)
Erin.883(2)
Erin.883(3)
Ermin.446
Ermua (b)
Error
Error.Inc.465
Error_Inc.260
Error_Inc.393
Error_vir
Error_vir (Gen1)
Escape.3200
Esm.539
ESP
Espacio.8486
Espacio.8486 (x)
Espejo
Est.2126
Este
Este.1459
ETC
ETen
ETen (X)
Eternity.157
Eternity.411
Eternity.562
Eternity.565
Ether
Eumel.347.C
Eumel.347.C(1)
Eumel.347.C(2)
Eumel.347.D
Eumel.347.D(1)
Eumel.347.D(2)
Eumel.363.A
Eumel.363.B
Eumel.363.d
Eumel.363.D1
Eumel.363.D1(1)
Eumel.363.D1(2)
Eumel.363.D1(3)
Eumel.363.E
Eumel.363.E(1)
Eumel.363.E(2)
Eumel.363.E(3)
Eumel.370
Eumel.370.B
Eumel.370.B(1)
Eumel.381.A
Eumel.381.B
Eumel.383 (2)
Eumel.383.D
Eumel.383.D(1)
Eumel.383.D(2)
Eumel.383.D(3)
Eumel.391
Eumel.391(1)
Eumel.393
Eumel.393.A1
Eumel.393.A1(1)
Eumel.401
Eumel.404
Eumel.415
Eumel.415(1)
Eumel.451
Eumel.451(1)
Eumel.527
Eumel.708
Eumel.756
Euphemistic.1731.C
Eupm.1731
Europe-92.421
Europe-92.424
Euskadi.811
Evasor.145
EVC v1.0
EVC.161
EVC.163
EVC.403
EVC.650.A
EVC.670.B
EVC.690.A
EVC.690.B
EVC.695.A
EVC.741
EVC.910.A
EVC.911
EVC.913
EVC.921
EVC.928
EVC.984.C
Evc.family
EVC.Gen
EVC.GR.b.773
EVC.GR.d.721
EVC.GR.f.648
EVC.GR.f.670
EVC.GR.r.860
EVC.GR.t.635
EVC.Gr.u
EVC.GR.w.1086
Eventide.1061
Eventtide.1061
Everfire
Evil Homer.206
Evil Homer.206 (2)
Evil-Spirit.1710
Evo.2770 (1)
Evo.2770 (2)
Evo.2770 (3)
Evo.2770 (4)
Evo.2770 (5)
Evo.2770 (6)
Evolution.2676
Evolution.2910.b
Evul(b)
Evul.ow.109
Evulz.833
Excess.3529
Excess.3529 (2)
Excess.3529 Dropper
Excess.3536
Excess.3536 (1)
Excombat.3093
EXE Infector
EXE.222
EXE.256
Exe.388
EXE.440
Exe.cav.360
Exe2Win.113
Exe2Win.132
Exe2Win.214
Exe2Win.710
EXE_Bug.B
EXE_Bug.C Dropper
Exebug.D
ExeBug.Dropper
ExeError.330
EXEHDR.BANE.256.C
EXEHDR.CLUST.384.C
EXEHDR.EM.250
EXEHDR.EM.250.B
EXEHE.379
ExeHeader.114
ExeHeader.324
ExeHeader.Cluster.277
ExeHeader.Pure.440.E
ExeHeader.Spy.176
ExeKilla.ow.48117
ExeKilla.ow.48117 (2)
Exemplary.586
Exile.255
Exit.376
Exorcist.272
Exp.1617
Exp.1619
Exp.CVE-2013-3910
Exp.CVE-2014-2799
Exp.CVE-2014-4065
Exp.CVE-2014-4080
Exp.CVE-2014-4081
Exp.CVE-2014-4082
Exp.CVE-2014-4084
Exp.CVE-2014-4086
Exp.CVE-2014-4088
Exp.CVE-2014-4089
Exp.CVE-2014-4092
Exp.CVE-2014-4095
Exp.CVE-2014-4127
Exp.CVE-2014-4129
Exp.CVE-2014-4130
Exp.CVE-2014-4141
Exp.CVE-2014-6334
Exp.CVE-2014-6337
Exp.CVE-2014-6339
Exp.CVE-2014-6341
Exp.CVE-2014-6347
Exp.CVE-2014-6348
Exp.CVE-2014-6353
Exp.CVE-2014-6355
Expand
Experiment.416
Experiment.755
expld.250
Explore.59904 2
Explore.59904 3
Explore.59904 4
Explore.59904 5
Explore666.59392(2)
Explore666.59904(2)
Explore666.59904(B2)
Explorer.3037
Explorer.3037 (s)
Explosion (1)
Explosion (2)
Explosion3
Extermin
Extermin (x)
Extrano.6702
Extrano.6702 (2)
Exunt
Eyye.803
*For continued protection, make sure that your Symantec subscription and/or license are up to date.

Threat Intelligence

Subscribe
Follow the Threat Intelligence Twitter feed
STAR Antimalware Protection Technologies
2014 Internet Security Threat Report, Vol 19