The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
BackDoor.Andromeda.1571
BackDoor.Andromeda.1584
BackDoor.Andromeda.1585
BackDoor.Andromeda.1586
BackDoor.Andromeda.159
BackDoor.Andromeda.1590
BackDoor.Andromeda.1592
BackDoor.Andromeda.1593
BackDoor.Andromeda.1594
BackDoor.Andromeda.1595
BackDoor.Andromeda.1604
BackDoor.Andromeda.1605
BackDoor.Andromeda.1606
BackDoor.Andromeda.1608
BackDoor.Andromeda.1610
BackDoor.Andromeda.1613
BackDoor.Andromeda.1614
BackDoor.Andromeda.1617
BackDoor.Andromeda.1619
BackDoor.Andromeda.1621
BackDoor.Andromeda.1622
BackDoor.Andromeda.1623
BackDoor.Andromeda.1624
BackDoor.Andromeda.1625
BackDoor.Andromeda.1626
BackDoor.Andromeda.1627
BackDoor.Andromeda.1628
BackDoor.Andromeda.1629
BackDoor.Andromeda.1630
BackDoor.Andromeda.1631
BackDoor.Andromeda.1632
BackDoor.Andromeda.1633
BackDoor.Andromeda.1634
BackDoor.Andromeda.1640
BackDoor.Andromeda.1641
BackDoor.Andromeda.1648
BackDoor.Andromeda.1659
BackDoor.Andromeda.166
BackDoor.Andromeda.167
BackDoor.Andromeda.1697
BackDoor.Andromeda.1714
BackDoor.Andromeda.1724
BackDoor.Andromeda.1726
BackDoor.Andromeda.175
BackDoor.Andromeda.1754
BackDoor.Andromeda.1757
BackDoor.Andromeda.1758
BackDoor.Andromeda.1760
BackDoor.Andromeda.1764
BackDoor.Andromeda.1765
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.