The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
Trojan.Dridex.1
Trojan.Dridex.1000
Trojan.Dridex.1001
Trojan.Dridex.1002
Trojan.Dridex.1004
Trojan.Dridex.1005
Trojan.Dridex.1006
Trojan.Dridex.1007
Trojan.Dridex.1008
Trojan.Dridex.1009
Trojan.Dridex.1010
Trojan.Dridex.1011
Trojan.Dridex.1012
Trojan.Dridex.1013
Trojan.Dridex.1014
Trojan.Dridex.1015
Trojan.Dridex.1016
Trojan.Dridex.1017
Trojan.Dridex.1018
Trojan.Dridex.1020
Trojan.Dridex.1021
Trojan.Dridex.1022
Trojan.Dridex.1023
Trojan.Dridex.1024
Trojan.Dridex.1025
Trojan.Dridex.1026
Trojan.Dridex.1027
Trojan.Dridex.1028
Trojan.Dridex.1029
Trojan.Dridex.1030
Trojan.Dridex.1031
Trojan.Dridex.1032
Trojan.Dridex.1033
Trojan.Dridex.1034
Trojan.Dridex.1035
Trojan.Dridex.1036
Trojan.Dridex.1037
Trojan.Dridex.1038
Trojan.Dridex.1039
Trojan.Dridex.1040
Trojan.Dridex.1041
Trojan.Dridex.1042
Trojan.Dridex.1043
Trojan.Dridex.1044
Trojan.Dridex.1045
Trojan.Dridex.1046
Trojan.Dridex.1047
Trojan.Dridex.1048
Trojan.Dridex.1049
Trojan.Dridex.105
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.