The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
BackDoor.Andromeda.111
BackDoor.Andromeda.1110
BackDoor.Andromeda.1111
BackDoor.Andromeda.1112
BackDoor.Andromeda.1113
BackDoor.Andromeda.1114
BackDoor.Andromeda.1115
BackDoor.Andromeda.1117
BackDoor.Andromeda.1119
BackDoor.Andromeda.112
BackDoor.Andromeda.1120
BackDoor.Andromeda.1122
BackDoor.Andromeda.1124
BackDoor.Andromeda.1126
BackDoor.Andromeda.1128
BackDoor.Andromeda.1129
BackDoor.Andromeda.113
BackDoor.Andromeda.1130
BackDoor.Andromeda.1131
BackDoor.Andromeda.1133
BackDoor.Andromeda.1134
BackDoor.Andromeda.1135
BackDoor.Andromeda.1136
BackDoor.Andromeda.1137
BackDoor.Andromeda.1138
BackDoor.Andromeda.1139
BackDoor.Andromeda.114
BackDoor.Andromeda.1140
BackDoor.Andromeda.1143
BackDoor.Andromeda.1144
BackDoor.Andromeda.1145
BackDoor.Andromeda.1146
BackDoor.Andromeda.1147
BackDoor.Andromeda.1148
BackDoor.Andromeda.1149
BackDoor.Andromeda.115
BackDoor.Andromeda.1150
BackDoor.Andromeda.1151
BackDoor.Andromeda.1152
BackDoor.Andromeda.1153
BackDoor.Andromeda.1154
BackDoor.Andromeda.1155
BackDoor.Andromeda.1157
BackDoor.Andromeda.1159
BackDoor.Andromeda.1160
BackDoor.Andromeda.1161
BackDoor.Andromeda.1162
BackDoor.Andromeda.1164
BackDoor.Andromeda.1165
BackDoor.Andromeda.117
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.