The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
BackDoor.Andromeda
BackDoor.Andromeda.1
BackDoor.Andromeda.1009
BackDoor.Andromeda.1011
BackDoor.Andromeda.1014
BackDoor.Andromeda.1017
BackDoor.Andromeda.1022
BackDoor.Andromeda.1027
BackDoor.Andromeda.103
BackDoor.Andromeda.1030
BackDoor.Andromeda.1035
BackDoor.Andromeda.1037
BackDoor.Andromeda.1039
BackDoor.Andromeda.1040
BackDoor.Andromeda.1041
BackDoor.Andromeda.1042
BackDoor.Andromeda.1043
BackDoor.Andromeda.1044
BackDoor.Andromeda.1048
BackDoor.Andromeda.105
BackDoor.Andromeda.1050
BackDoor.Andromeda.1056
BackDoor.Andromeda.1057
BackDoor.Andromeda.1058
BackDoor.Andromeda.106
BackDoor.Andromeda.1061
BackDoor.Andromeda.1062
BackDoor.Andromeda.1063
BackDoor.Andromeda.1065
BackDoor.Andromeda.1066
BackDoor.Andromeda.1068
BackDoor.Andromeda.1069
BackDoor.Andromeda.1070
BackDoor.Andromeda.1072
BackDoor.Andromeda.1073
BackDoor.Andromeda.1074
BackDoor.Andromeda.1083
BackDoor.Andromeda.1086
BackDoor.Andromeda.1087
BackDoor.Andromeda.1089
BackDoor.Andromeda.109
BackDoor.Andromeda.1091
BackDoor.Andromeda.1092
BackDoor.Andromeda.1096
BackDoor.Andromeda.1097
BackDoor.Andromeda.1100
BackDoor.Andromeda.1103
BackDoor.Andromeda.1105
BackDoor.Andromeda.1107
BackDoor.Andromeda.1108
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.