Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

BackDoor.Andromeda in virus library:

BackDoor.Andromeda.221
BackDoor.Andromeda.225
BackDoor.Andromeda.233
BackDoor.Andromeda.238
BackDoor.Andromeda.240
BackDoor.Andromeda.243
BackDoor.Andromeda.244
BackDoor.Andromeda.245
BackDoor.Andromeda.246
BackDoor.Andromeda.249
BackDoor.Andromeda.250
BackDoor.Andromeda.252
BackDoor.Andromeda.26
BackDoor.Andromeda.267
BackDoor.Andromeda.272
BackDoor.Andromeda.279
BackDoor.Andromeda.282
BackDoor.Andromeda.30
BackDoor.Andromeda.312
BackDoor.Andromeda.317
BackDoor.Andromeda.335
BackDoor.Andromeda.340
BackDoor.Andromeda.343
BackDoor.Andromeda.344
BackDoor.Andromeda.345
BackDoor.Andromeda.348
BackDoor.Andromeda.351
BackDoor.Andromeda.352
BackDoor.Andromeda.353
BackDoor.Andromeda.354
BackDoor.Andromeda.356
BackDoor.Andromeda.358
BackDoor.Andromeda.359
BackDoor.Andromeda.362
BackDoor.Andromeda.363
BackDoor.Andromeda.365
BackDoor.Andromeda.366
BackDoor.Andromeda.367
BackDoor.Andromeda.368
BackDoor.Andromeda.370
BackDoor.Andromeda.373
BackDoor.Andromeda.374
BackDoor.Andromeda.375
BackDoor.Andromeda.376
BackDoor.Andromeda.378
BackDoor.Andromeda.383
BackDoor.Andromeda.388
BackDoor.Andromeda.392
BackDoor.Andromeda.393
BackDoor.Andromeda.394

1 2 3 4 5 6 7 8 9 10 11 12 13

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.