The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
W97M.DownLoader.1165
W97M.DownLoader.2299
W97M.DownLoader.2340
W97M.DownLoader.2594
W97M.DownLoader.2641
W97M.DownLoader.3053
W97M.DownLoader.3117
W97M.DownLoader.3171
W97M.DownLoader.3242
W97M.DownLoader.3261
W97M.DownLoader.3304
W97M.DownLoader.3351
W97M.DownLoader.3383
W97M.DownLoader.3933
W97M.DownLoader.3934
W97M.DownLoader.3935
W97M.DownLoader.4002
W97M.DownLoader.4064
W97M.DownLoader.4071
W97M.DownLoader.4075
W97M.DownLoader.4076
W97M.DownLoader.4077
W97M.DownLoader.4078
W97M.DownLoader.4080
W97M.DownLoader.4081
W97M.DownLoader.4084
W97M.DownLoader.4086
W97M.DownLoader.4091
W97M.DownLoader.4092
W97M.DownLoader.4093
W97M.DownLoader.4102
W97M.DownLoader.4104
W97M.DownLoader.4107
W97M.DownLoader.4111
W97M.DownLoader.4114
W97M.DownLoader.4116
W97M.DownLoader.4118
W97M.DownLoader.4119
W97M.DownLoader.4122
W97M.DownLoader.4128
W97M.DownLoader.4129
W97M.DownLoader.4130
W97M.DownLoader.4131
W97M.DownLoader.4132
W97M.DownLoader.4133
W97M.DownLoader.4136
W97M.DownLoader.4147
W97M.DownLoader.4148
W97M.DownLoader.4151
W97M.DownLoader.4152
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.