The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
BackDoor.Andromeda.1315
BackDoor.Andromeda.1316
BackDoor.Andromeda.1317
BackDoor.Andromeda.1318
BackDoor.Andromeda.1319
BackDoor.Andromeda.1320
BackDoor.Andromeda.1321
BackDoor.Andromeda.1322
BackDoor.Andromeda.1325
BackDoor.Andromeda.1326
BackDoor.Andromeda.1327
BackDoor.Andromeda.1328
BackDoor.Andromeda.1329
BackDoor.Andromeda.1330
BackDoor.Andromeda.1332
BackDoor.Andromeda.1334
BackDoor.Andromeda.1335
BackDoor.Andromeda.1337
BackDoor.Andromeda.1339
BackDoor.Andromeda.1340
BackDoor.Andromeda.1341
BackDoor.Andromeda.1345
BackDoor.Andromeda.1348
BackDoor.Andromeda.1351
BackDoor.Andromeda.1352
BackDoor.Andromeda.1353
BackDoor.Andromeda.1358
BackDoor.Andromeda.1359
BackDoor.Andromeda.1360
BackDoor.Andromeda.1372
BackDoor.Andromeda.1377
BackDoor.Andromeda.1378
BackDoor.Andromeda.1381
BackDoor.Andromeda.1384
BackDoor.Andromeda.1391
BackDoor.Andromeda.1392
BackDoor.Andromeda.1394
BackDoor.Andromeda.1396
BackDoor.Andromeda.1398
BackDoor.Andromeda.1401
BackDoor.Andromeda.1402
BackDoor.Andromeda.1406
BackDoor.Andromeda.1407
BackDoor.Andromeda.1408
BackDoor.Andromeda.1409
BackDoor.Andromeda.1411
BackDoor.Andromeda.1416
BackDoor.Andromeda.1417
BackDoor.Andromeda.1428
BackDoor.Andromeda.1429
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.