The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42
BackDoor.Bifrost.28700
BackDoor.Bifrost.28701
BackDoor.Bifrost.28702
BackDoor.Bifrost.28703
BackDoor.Bifrost.28704
BackDoor.Bifrost.28705
BackDoor.Bifrost.28706
BackDoor.Bifrost.28707
BackDoor.Bifrost.28709
BackDoor.Bifrost.28710
BackDoor.Bifrost.28711
BackDoor.Bifrost.28712
BackDoor.Bifrost.28714
BackDoor.Bifrost.28715
BackDoor.Bifrost.28716
BackDoor.Bifrost.28717
BackDoor.Bifrost.28718
BackDoor.Bifrost.28719
BackDoor.Bifrost.28720
BackDoor.Bifrost.28721
BackDoor.Bifrost.28722
BackDoor.Bifrost.28723
BackDoor.Bifrost.28724
BackDoor.Bifrost.28725
BackDoor.Bifrost.28726
BackDoor.Bifrost.28727
BackDoor.Bifrost.28729
BackDoor.Bifrost.28731
BackDoor.Bifrost.28732
BackDoor.Bifrost.28733
BackDoor.Bifrost.28734
BackDoor.Bifrost.28735
BackDoor.Bifrost.28736
BackDoor.Bifrost.28737
BackDoor.Bifrost.28738
BackDoor.Bifrost.28739
BackDoor.Bifrost.28740
BackDoor.Bifrost.28741
BackDoor.Bifrost.28742
BackDoor.Bifrost.28744
BackDoor.Bifrost.28745
BackDoor.Bifrost.28746
BackDoor.Bifrost.28747
BackDoor.Bifrost.28748
BackDoor.Bifrost.28749
BackDoor.Bifrost.28750
BackDoor.Bifrost.28751
BackDoor.Bifrost.28752
BackDoor.Bifrost.28753
BackDoor.Bifrost.28754
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.