The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
Trojan.Carberp.1
Trojan.Carberp.10
Trojan.Carberp.1012
Trojan.Carberp.1025
Trojan.Carberp.1026
Trojan.Carberp.1056
Trojan.Carberp.1058
Trojan.Carberp.1063
Trojan.Carberp.1069
Trojan.Carberp.1070
Trojan.Carberp.1071
Trojan.Carberp.1072
Trojan.Carberp.1074
Trojan.Carberp.1076
Trojan.Carberp.1084
Trojan.Carberp.1086
Trojan.Carberp.1088
Trojan.Carberp.1090
Trojan.Carberp.1098
Trojan.Carberp.11
Trojan.Carberp.1103
Trojan.Carberp.1115
Trojan.Carberp.1117
Trojan.Carberp.1119
Trojan.Carberp.1125
Trojan.Carberp.1129
Trojan.Carberp.1138
Trojan.Carberp.1146
Trojan.Carberp.1159
Trojan.Carberp.1167
Trojan.Carberp.1170
Trojan.Carberp.1172
Trojan.Carberp.1173
Trojan.Carberp.1176
Trojan.Carberp.1177
Trojan.Carberp.1178
Trojan.Carberp.1179
Trojan.Carberp.1180
Trojan.Carberp.1181
Trojan.Carberp.1182
Trojan.Carberp.1183
Trojan.Carberp.1184
Trojan.Carberp.1185
Trojan.Carberp.1186
Trojan.Carberp.1190
Trojan.Carberp.1193
Trojan.Carberp.1194
Trojan.Carberp.1195
Trojan.Carberp.1196
Trojan.Carberp.1197
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.