The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
Trojan.Mayachok.1
Trojan.Mayachok.10138
Trojan.Mayachok.1016
Trojan.Mayachok.1017
Trojan.Mayachok.1020
Trojan.Mayachok.1022
Trojan.Mayachok.1024
Trojan.Mayachok.1027
Trojan.Mayachok.1045
Trojan.Mayachok.1047
Trojan.Mayachok.1048
Trojan.Mayachok.1050
Trojan.Mayachok.10524
Trojan.Mayachok.10537
Trojan.Mayachok.10538
Trojan.Mayachok.1055
Trojan.Mayachok.1056
Trojan.Mayachok.1058
Trojan.Mayachok.10836
Trojan.Mayachok.10959
Trojan.Mayachok.10976
Trojan.Mayachok.11013
Trojan.Mayachok.1114
Trojan.Mayachok.11316
Trojan.Mayachok.11374
Trojan.Mayachok.11406
Trojan.Mayachok.11477
Trojan.Mayachok.1154
Trojan.Mayachok.1155
Trojan.Mayachok.1156
Trojan.Mayachok.1159
Trojan.Mayachok.1160
Trojan.Mayachok.1166
Trojan.Mayachok.1170
Trojan.Mayachok.1171
Trojan.Mayachok.1172
Trojan.Mayachok.1173
Trojan.Mayachok.1176
Trojan.Mayachok.1177
Trojan.Mayachok.1178
Trojan.Mayachok.1179
Trojan.Mayachok.1180
Trojan.Mayachok.1181
Trojan.Mayachok.1184
Trojan.Mayachok.1185
Trojan.Mayachok.1186
Trojan.Mayachok.1187
Trojan.Mayachok.1188
Trojan.Mayachok.1189
Trojan.Mayachok.1190
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.