Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Android.Backdoor in virus library:

Android.BackDoor – family of Trojans that target mobile devices under Android OS and are capable of executing commands from cybercriminals. Depending on the modification, the Trojans can send text messages, open certain URLs in the installed web browser, gather information on the infected device, provide cybercriminals with phone book information, download other applications, and perform other malicious actions.

Android.Backdoor in virus library:

Android.BackDoor.1011
Android.Backdoor.1000
Android.Backdoor.1001
Android.Backdoor.1002
Android.Backdoor.1003
Android.Backdoor.1004
Android.Backdoor.1005
Android.Backdoor.1006
Android.Backdoor.1007
Android.Backdoor.1008
Android.Backdoor.1009
Android.Backdoor.1010
Android.Backdoor.1016
Android.Backdoor.1017
Android.Backdoor.1019
Android.Backdoor.1020
Android.Backdoor.1021
Android.Backdoor.1022
Android.Backdoor.1023
Android.Backdoor.1024
Android.Backdoor.1025
Android.Backdoor.1026
Android.Backdoor.1027
Android.Backdoor.1028
Android.Backdoor.1029
Android.Backdoor.1030
Android.Backdoor.1031
Android.Backdoor.1032
Android.Backdoor.1033
Android.Backdoor.1034
Android.Backdoor.1035
Android.Backdoor.1036
Android.Backdoor.1037
Android.Backdoor.1039
Android.Backdoor.1040
Android.Backdoor.1041
Android.Backdoor.1042
Android.Backdoor.1043
Android.Backdoor.1044
Android.Backdoor.1045
Android.Backdoor.1046
Android.Backdoor.1047
Android.Backdoor.1048
Android.Backdoor.1049
Android.Backdoor.1050
Android.Backdoor.1051
Android.Backdoor.1052
Android.Backdoor.1053
Android.Backdoor.1054
Android.Backdoor.1055

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.