The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42
BackDoor.Bifrost.28542
BackDoor.Bifrost.28543
BackDoor.Bifrost.28544
BackDoor.Bifrost.28545
BackDoor.Bifrost.28546
BackDoor.Bifrost.28547
BackDoor.Bifrost.28548
BackDoor.Bifrost.28549
BackDoor.Bifrost.28550
BackDoor.Bifrost.28552
BackDoor.Bifrost.28553
BackDoor.Bifrost.28554
BackDoor.Bifrost.28555
BackDoor.Bifrost.28556
BackDoor.Bifrost.28557
BackDoor.Bifrost.28558
BackDoor.Bifrost.28559
BackDoor.Bifrost.28560
BackDoor.Bifrost.28561
BackDoor.Bifrost.28562
BackDoor.Bifrost.28563
BackDoor.Bifrost.28564
BackDoor.Bifrost.28566
BackDoor.Bifrost.28567
BackDoor.Bifrost.28568
BackDoor.Bifrost.28569
BackDoor.Bifrost.28570
BackDoor.Bifrost.28571
BackDoor.Bifrost.28572
BackDoor.Bifrost.28573
BackDoor.Bifrost.28574
BackDoor.Bifrost.28575
BackDoor.Bifrost.28576
BackDoor.Bifrost.28578
BackDoor.Bifrost.28579
BackDoor.Bifrost.28580
BackDoor.Bifrost.28581
BackDoor.Bifrost.28582
BackDoor.Bifrost.28583
BackDoor.Bifrost.28584
BackDoor.Bifrost.28585
BackDoor.Bifrost.28586
BackDoor.Bifrost.28587
BackDoor.Bifrost.28588
BackDoor.Bifrost.28589
BackDoor.Bifrost.28590
BackDoor.Bifrost.28591
BackDoor.Bifrost.28592
BackDoor.Bifrost.28593
BackDoor.Bifrost.28594
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.