The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
1 2
Trojan.Winlock
Trojan.Winlock.10006
Trojan.Winlock.10009
Trojan.Winlock.10011
Trojan.Winlock.10044
Trojan.Winlock.10050
Trojan.Winlock.10060
Trojan.Winlock.10061
Trojan.Winlock.10074
Trojan.Winlock.10085
Trojan.Winlock.10092
Trojan.Winlock.10093
Trojan.Winlock.10095
Trojan.Winlock.10096
Trojan.Winlock.10104
Trojan.Winlock.10105
Trojan.Winlock.10111
Trojan.Winlock.10117
Trojan.Winlock.10160
Trojan.Winlock.10165
Trojan.Winlock.10180
Trojan.Winlock.10185
Trojan.Winlock.10189
Trojan.Winlock.10207
Trojan.Winlock.10212
Trojan.Winlock.10216
Trojan.Winlock.10220
Trojan.Winlock.10221
Trojan.Winlock.10223
Trojan.Winlock.10226
Trojan.Winlock.10227
Trojan.Winlock.10234
Trojan.Winlock.10249
Trojan.Winlock.10252
Trojan.Winlock.10264
Trojan.Winlock.10272
Trojan.Winlock.10301
Trojan.Winlock.10308
Trojan.Winlock.10310
Trojan.Winlock.10318
Trojan.Winlock.10343
Trojan.Winlock.10349
Trojan.Winlock.10350
Trojan.Winlock.10357
Trojan.Winlock.10372
Trojan.Winlock.10374
Trojan.Winlock.10388
Trojan.Winlock.10392
Trojan.Winlock.10399
Trojan.Winlock.10400
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.