The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
BackDoor.Andromeda.1430
BackDoor.Andromeda.1431
BackDoor.Andromeda.1432
BackDoor.Andromeda.1433
BackDoor.Andromeda.1434
BackDoor.Andromeda.1436
BackDoor.Andromeda.1440
BackDoor.Andromeda.1445
BackDoor.Andromeda.1446
BackDoor.Andromeda.1449
BackDoor.Andromeda.1451
BackDoor.Andromeda.1455
BackDoor.Andromeda.1461
BackDoor.Andromeda.1465
BackDoor.Andromeda.1466
BackDoor.Andromeda.1471
BackDoor.Andromeda.1475
BackDoor.Andromeda.1477
BackDoor.Andromeda.1478
BackDoor.Andromeda.1479
BackDoor.Andromeda.1481
BackDoor.Andromeda.1482
BackDoor.Andromeda.1487
BackDoor.Andromeda.1488
BackDoor.Andromeda.1489
BackDoor.Andromeda.1492
BackDoor.Andromeda.1495
BackDoor.Andromeda.1498
BackDoor.Andromeda.1500
BackDoor.Andromeda.1501
BackDoor.Andromeda.1502
BackDoor.Andromeda.1504
BackDoor.Andromeda.1505
BackDoor.Andromeda.1506
BackDoor.Andromeda.1507
BackDoor.Andromeda.1508
BackDoor.Andromeda.1512
BackDoor.Andromeda.152
BackDoor.Andromeda.1521
BackDoor.Andromeda.1526
BackDoor.Andromeda.1527
BackDoor.Andromeda.1533
BackDoor.Andromeda.1547
BackDoor.Andromeda.1553
BackDoor.Andromeda.1555
BackDoor.Andromeda.1556
BackDoor.Andromeda.1557
BackDoor.Andromeda.1559
BackDoor.Andromeda.1560
BackDoor.Andromeda.1561
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.