The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42
BackDoor.Bifrost.28379
BackDoor.Bifrost.28380
BackDoor.Bifrost.28381
BackDoor.Bifrost.28382
BackDoor.Bifrost.28383
BackDoor.Bifrost.28384
BackDoor.Bifrost.28385
BackDoor.Bifrost.28386
BackDoor.Bifrost.28387
BackDoor.Bifrost.28388
BackDoor.Bifrost.28389
BackDoor.Bifrost.28390
BackDoor.Bifrost.28391
BackDoor.Bifrost.28393
BackDoor.Bifrost.28394
BackDoor.Bifrost.28395
BackDoor.Bifrost.28396
BackDoor.Bifrost.28397
BackDoor.Bifrost.28398
BackDoor.Bifrost.28399
BackDoor.Bifrost.28400
BackDoor.Bifrost.28401
BackDoor.Bifrost.28402
BackDoor.Bifrost.28403
BackDoor.Bifrost.28404
BackDoor.Bifrost.28405
BackDoor.Bifrost.28406
BackDoor.Bifrost.28407
BackDoor.Bifrost.28408
BackDoor.Bifrost.28409
BackDoor.Bifrost.28410
BackDoor.Bifrost.28411
BackDoor.Bifrost.28412
BackDoor.Bifrost.28413
BackDoor.Bifrost.28414
BackDoor.Bifrost.28415
BackDoor.Bifrost.28416
BackDoor.Bifrost.28417
BackDoor.Bifrost.28418
BackDoor.Bifrost.28419
BackDoor.Bifrost.28420
BackDoor.Bifrost.28421
BackDoor.Bifrost.28422
BackDoor.Bifrost.28423
BackDoor.Bifrost.28424
BackDoor.Bifrost.28426
BackDoor.Bifrost.28427
BackDoor.Bifrost.28428
BackDoor.Bifrost.28429
BackDoor.Bifrost.28430
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.