The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42
BackDoor.Bifrost.28645
BackDoor.Bifrost.28646
BackDoor.Bifrost.28647
BackDoor.Bifrost.28648
BackDoor.Bifrost.28649
BackDoor.Bifrost.28651
BackDoor.Bifrost.28652
BackDoor.Bifrost.28653
BackDoor.Bifrost.28654
BackDoor.Bifrost.28655
BackDoor.Bifrost.28656
BackDoor.Bifrost.28657
BackDoor.Bifrost.28658
BackDoor.Bifrost.28660
BackDoor.Bifrost.28661
BackDoor.Bifrost.28662
BackDoor.Bifrost.28663
BackDoor.Bifrost.28664
BackDoor.Bifrost.28665
BackDoor.Bifrost.28666
BackDoor.Bifrost.28667
BackDoor.Bifrost.28668
BackDoor.Bifrost.28669
BackDoor.Bifrost.28670
BackDoor.Bifrost.28671
BackDoor.Bifrost.28672
BackDoor.Bifrost.28673
BackDoor.Bifrost.28674
BackDoor.Bifrost.28675
BackDoor.Bifrost.28676
BackDoor.Bifrost.28677
BackDoor.Bifrost.28678
BackDoor.Bifrost.28679
BackDoor.Bifrost.28680
BackDoor.Bifrost.28681
BackDoor.Bifrost.28682
BackDoor.Bifrost.28684
BackDoor.Bifrost.28685
BackDoor.Bifrost.28686
BackDoor.Bifrost.28687
BackDoor.Bifrost.28688
BackDoor.Bifrost.28689
BackDoor.Bifrost.28690
BackDoor.Bifrost.28691
BackDoor.Bifrost.28692
BackDoor.Bifrost.28693
BackDoor.Bifrost.28695
BackDoor.Bifrost.28696
BackDoor.Bifrost.28698
BackDoor.Bifrost.28699
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.