The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
BackDoor.Poison.10046
BackDoor.Poison.1005
BackDoor.Poison.10070
BackDoor.Poison.10112
BackDoor.Poison.10137
BackDoor.Poison.10176
BackDoor.Poison.10214
BackDoor.Poison.10241
BackDoor.Poison.10295
BackDoor.Poison.10300
BackDoor.Poison.10311
BackDoor.Poison.10328
BackDoor.Poison.10336
BackDoor.Poison.10437
BackDoor.Poison.10447
BackDoor.Poison.10531
BackDoor.Poison.10534
BackDoor.Poison.10704
BackDoor.Poison.10708
BackDoor.Poison.10753
BackDoor.Poison.10789
BackDoor.Poison.10826
BackDoor.Poison.10881
BackDoor.Poison.10958
BackDoor.Poison.11033
BackDoor.Poison.11099
BackDoor.Poison.11124
BackDoor.Poison.11211
BackDoor.Poison.11579
BackDoor.Poison.11585
BackDoor.Poison.11594
BackDoor.Poison.11599
BackDoor.Poison.11658
BackDoor.Poison.11694
BackDoor.Poison.11731
BackDoor.Poison.11788
BackDoor.Poison.11804
BackDoor.Poison.11815
BackDoor.Poison.11854
BackDoor.Poison.11928
BackDoor.Poison.11930
BackDoor.Poison.11970
BackDoor.Poison.11985
BackDoor.Poison.12032
BackDoor.Poison.12037
BackDoor.Poison.12062
BackDoor.Poison.12082
BackDoor.Poison.12106
BackDoor.Poison.12107
BackDoor.Poison.12108
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.