Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Android.Joker in virus library:

A trojan family for Android devices. Cybercriminals distribute the trojans via Google Play under the guise of games and various software, such as image collections, photo editors, utilities, etc.

The Android.Joker trojans, capable of executing arbitrary code, launch auxiliary modules, downloaded from a remote server. This malware steals contact data, hooks text messages, and subscribes users to premium services by opening the respective webpages and automatically confirming the subscription.

Android.Joker in virus library:

Android.Joker.770
Android.Joker.783
Android.Joker.784
Android.Joker.785
Android.Joker.789
Android.Joker.790
Android.Joker.791
Android.Joker.828
Android.Joker.838
Android.Joker.856
Android.Joker.857
Android.Joker.864
Android.Joker.872
Android.Joker.877
Android.Joker.878
Android.Joker.879
Android.Joker.914
Android.Joker.915
Android.Joker.923
Android.Joker.931
Android.Joker.935
Android.Joker.944
Android.Joker.945
Android.Joker.948
Android.Joker.957
Android.Joker.959
Android.Joker.964
Android.Joker.967
Android.Joker.980
Android.Joker.984
Android.Joker.990
Android.Joker.991
Android.Joker.992
Android.Joker.994

1 2 3 4 5 6 7

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.