The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
Trojan programs for Android, the main purpose of which is to download and run an arbitrary code.
Android.RemoteCode.1046
Android.RemoteCode.1048
Android.RemoteCode.1049
Android.RemoteCode.105
Android.RemoteCode.1051
Android.RemoteCode.1052
Android.RemoteCode.1053
Android.RemoteCode.1054
Android.RemoteCode.1056
Android.RemoteCode.1057
Android.RemoteCode.1058
Android.RemoteCode.1059
Android.RemoteCode.106
Android.RemoteCode.106.origin
Android.RemoteCode.1060
Android.RemoteCode.1061
Android.RemoteCode.1062
Android.RemoteCode.1063
Android.RemoteCode.1064
Android.RemoteCode.1065
Android.RemoteCode.1066
Android.RemoteCode.1067
Android.RemoteCode.1068
Android.RemoteCode.1069
Android.RemoteCode.107
Android.RemoteCode.1070
Android.RemoteCode.1071
Android.RemoteCode.1072
Android.RemoteCode.1073
Android.RemoteCode.1079
Android.RemoteCode.108
Android.RemoteCode.1080
Android.RemoteCode.1081
Android.RemoteCode.1083
Android.RemoteCode.1084
Android.RemoteCode.1085
Android.RemoteCode.1087
Android.RemoteCode.1088
Android.RemoteCode.1089
Android.RemoteCode.109
Android.RemoteCode.1090
Android.RemoteCode.1091
Android.RemoteCode.1092
Android.RemoteCode.1093
Android.RemoteCode.1094
Android.RemoteCode.1095
Android.RemoteCode.1096
Android.RemoteCode.1097
Android.RemoteCode.1098
Android.RemoteCode.1099
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.