The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42
BackDoor.Bifrost.28323
BackDoor.Bifrost.28324
BackDoor.Bifrost.28325
BackDoor.Bifrost.28327
BackDoor.Bifrost.28328
BackDoor.Bifrost.28329
BackDoor.Bifrost.28330
BackDoor.Bifrost.28331
BackDoor.Bifrost.28333
BackDoor.Bifrost.28334
BackDoor.Bifrost.28335
BackDoor.Bifrost.28336
BackDoor.Bifrost.28337
BackDoor.Bifrost.28339
BackDoor.Bifrost.28340
BackDoor.Bifrost.28341
BackDoor.Bifrost.28342
BackDoor.Bifrost.28343
BackDoor.Bifrost.28344
BackDoor.Bifrost.28346
BackDoor.Bifrost.28347
BackDoor.Bifrost.28348
BackDoor.Bifrost.28350
BackDoor.Bifrost.28351
BackDoor.Bifrost.28352
BackDoor.Bifrost.28353
BackDoor.Bifrost.28354
BackDoor.Bifrost.28355
BackDoor.Bifrost.28356
BackDoor.Bifrost.28357
BackDoor.Bifrost.28358
BackDoor.Bifrost.28359
BackDoor.Bifrost.28360
BackDoor.Bifrost.28361
BackDoor.Bifrost.28363
BackDoor.Bifrost.28364
BackDoor.Bifrost.28365
BackDoor.Bifrost.28366
BackDoor.Bifrost.28367
BackDoor.Bifrost.28368
BackDoor.Bifrost.28369
BackDoor.Bifrost.28370
BackDoor.Bifrost.28371
BackDoor.Bifrost.28372
BackDoor.Bifrost.28373
BackDoor.Bifrost.28374
BackDoor.Bifrost.28375
BackDoor.Bifrost.28376
BackDoor.Bifrost.28377
BackDoor.Bifrost.28378
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.