The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
Trojan.Zadved.1
Trojan.Zadved.1332
Trojan.Zadved.1576
Trojan.Zadved.1577
Trojan.Zadved.158
Trojan.Zadved.1581
Trojan.Zadved.1583
Trojan.Zadved.1586
Trojan.Zadved.1592
Trojan.Zadved.1600
Trojan.Zadved.1603
Trojan.Zadved.1604
Trojan.Zadved.1612
Trojan.Zadved.1616
Trojan.Zadved.1625
Trojan.Zadved.1630
Trojan.Zadved.1631
Trojan.Zadved.1635
Trojan.Zadved.1636
Trojan.Zadved.1637
Trojan.Zadved.1638
Trojan.Zadved.1642
Trojan.Zadved.1643
Trojan.Zadved.1644
Trojan.Zadved.1645
Trojan.Zadved.1648
Trojan.Zadved.1652
Trojan.Zadved.1654
Trojan.Zadved.1655
Trojan.Zadved.1659
Trojan.Zadved.1661
Trojan.Zadved.1663
Trojan.Zadved.1668
Trojan.Zadved.1673
Trojan.Zadved.1677
Trojan.Zadved.1679
Trojan.Zadved.1680
Trojan.Zadved.1683
Trojan.Zadved.1684
Trojan.Zadved.1685
Trojan.Zadved.1686
Trojan.Zadved.1690
Trojan.Zadved.1694
Trojan.Zadved.1695
Trojan.Zadved.1696
Trojan.Zadved.1700
Trojan.Zadved.1701
Trojan.Zadved.1702
Trojan.Zadved.1704
Trojan.Zadved.1705
1 2
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.