The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
1 2
Trojan.Baidu.103
Trojan.Baidu.1100
Trojan.Baidu.1108
Trojan.Baidu.122
Trojan.Baidu.125
Trojan.Baidu.1385
Trojan.Baidu.1386
Trojan.Baidu.1548
Trojan.Baidu.1624
Trojan.Baidu.1642
Trojan.Baidu.1657
Trojan.Baidu.1660
Trojan.Baidu.1722
Trojan.Baidu.1746
Trojan.Baidu.1807
Trojan.Baidu.1845
Trojan.Baidu.1872
Trojan.Baidu.1873
Trojan.Baidu.1876
Trojan.Baidu.1879
Trojan.Baidu.1880
Trojan.Baidu.1882
Trojan.Baidu.1884
Trojan.Baidu.1885
Trojan.Baidu.1886
Trojan.Baidu.1887
Trojan.Baidu.1888
Trojan.Baidu.1889
Trojan.Baidu.1891
Trojan.Baidu.1895
Trojan.Baidu.1903
Trojan.Baidu.1951
Trojan.Baidu.196
Trojan.Baidu.1968
Trojan.Baidu.1969
Trojan.Baidu.197
Trojan.Baidu.1970
Trojan.Baidu.1980
Trojan.Baidu.201
Trojan.Baidu.2024
Trojan.Baidu.204
Trojan.Baidu.218
Trojan.Baidu.225
Trojan.Baidu.235
Trojan.Baidu.248
Trojan.Baidu.256
Trojan.Baidu.270
Trojan.Baidu.275
Trojan.Baidu.276
Trojan.Baidu.277
1 2
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.