The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
Trojan.Upatre.1
Trojan.Upatre.10
Trojan.Upatre.100
Trojan.Upatre.101
Trojan.Upatre.10110
Trojan.Upatre.10157
Trojan.Upatre.1016
Trojan.Upatre.10162
Trojan.Upatre.102
Trojan.Upatre.10223
Trojan.Upatre.10235
Trojan.Upatre.10242
Trojan.Upatre.10243
Trojan.Upatre.10245
Trojan.Upatre.10247
Trojan.Upatre.10270
Trojan.Upatre.10286
Trojan.Upatre.10288
Trojan.Upatre.103
Trojan.Upatre.10302
Trojan.Upatre.10305
Trojan.Upatre.10307
Trojan.Upatre.10311
Trojan.Upatre.10319
Trojan.Upatre.10324
Trojan.Upatre.10327
Trojan.Upatre.10328
Trojan.Upatre.10335
Trojan.Upatre.10336
Trojan.Upatre.10338
Trojan.Upatre.10340
Trojan.Upatre.10343
Trojan.Upatre.10346
Trojan.Upatre.10347
Trojan.Upatre.10348
Trojan.Upatre.10349
Trojan.Upatre.10350
Trojan.Upatre.10352
Trojan.Upatre.10355
Trojan.Upatre.10357
Trojan.Upatre.10362
Trojan.Upatre.10367
Trojan.Upatre.10373
Trojan.Upatre.10374
Trojan.Upatre.10375
Trojan.Upatre.10376
Trojan.Upatre.10378
Trojan.Upatre.10379
Trojan.Upatre.10380
Trojan.Upatre.10383
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.