Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

BackDoor.Andromeda in virus library:

BackDoor.Andromeda.754
BackDoor.Andromeda.761
BackDoor.Andromeda.763
BackDoor.Andromeda.768
BackDoor.Andromeda.773
BackDoor.Andromeda.778
BackDoor.Andromeda.78
BackDoor.Andromeda.780
BackDoor.Andromeda.788
BackDoor.Andromeda.795
BackDoor.Andromeda.796
BackDoor.Andromeda.80
BackDoor.Andromeda.800
BackDoor.Andromeda.802
BackDoor.Andromeda.808
BackDoor.Andromeda.809
BackDoor.Andromeda.81
BackDoor.Andromeda.810
BackDoor.Andromeda.811
BackDoor.Andromeda.814
BackDoor.Andromeda.82
BackDoor.Andromeda.820
BackDoor.Andromeda.821
BackDoor.Andromeda.823
BackDoor.Andromeda.826
BackDoor.Andromeda.827
BackDoor.Andromeda.828
BackDoor.Andromeda.83
BackDoor.Andromeda.833
BackDoor.Andromeda.834
BackDoor.Andromeda.836
BackDoor.Andromeda.838
BackDoor.Andromeda.845
BackDoor.Andromeda.847
BackDoor.Andromeda.852
BackDoor.Andromeda.853
BackDoor.Andromeda.858
BackDoor.Andromeda.859
BackDoor.Andromeda.861
BackDoor.Andromeda.865
BackDoor.Andromeda.866
BackDoor.Andromeda.868
BackDoor.Andromeda.87
BackDoor.Andromeda.879
BackDoor.Andromeda.88
BackDoor.Andromeda.880
BackDoor.Andromeda.882
BackDoor.Andromeda.885
BackDoor.Andromeda.888
BackDoor.Andromeda.889

1 2 3 4 5 6 7 8 9 10 11 12 13

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.