The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
BackDoor.Andromeda.1766
BackDoor.Andromeda.177
BackDoor.Andromeda.178
BackDoor.Andromeda.1796
BackDoor.Andromeda.1797
BackDoor.Andromeda.1798
BackDoor.Andromeda.1802
BackDoor.Andromeda.1803
BackDoor.Andromeda.1804
BackDoor.Andromeda.1805
BackDoor.Andromeda.1806
BackDoor.Andromeda.1808
BackDoor.Andromeda.1809
BackDoor.Andromeda.1811
BackDoor.Andromeda.1814
BackDoor.Andromeda.1815
BackDoor.Andromeda.1816
BackDoor.Andromeda.1817
BackDoor.Andromeda.1825
BackDoor.Andromeda.1828
BackDoor.Andromeda.1836
BackDoor.Andromeda.184
BackDoor.Andromeda.185
BackDoor.Andromeda.190
BackDoor.Andromeda.191
BackDoor.Andromeda.192
BackDoor.Andromeda.193
BackDoor.Andromeda.195
BackDoor.Andromeda.198
BackDoor.Andromeda.2
BackDoor.Andromeda.201
BackDoor.Andromeda.202
BackDoor.Andromeda.206
BackDoor.Andromeda.209
BackDoor.Andromeda.211
BackDoor.Andromeda.216
BackDoor.Andromeda.218
BackDoor.Andromeda.22
BackDoor.Andromeda.221
BackDoor.Andromeda.225
BackDoor.Andromeda.233
BackDoor.Andromeda.238
BackDoor.Andromeda.240
BackDoor.Andromeda.243
BackDoor.Andromeda.244
BackDoor.Andromeda.245
BackDoor.Andromeda.246
BackDoor.Andromeda.249
BackDoor.Andromeda.250
BackDoor.Andromeda.252
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.