The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42
BackDoor.Bifrost.28755
BackDoor.Bifrost.28756
BackDoor.Bifrost.28757
BackDoor.Bifrost.28758
BackDoor.Bifrost.28760
BackDoor.Bifrost.28761
BackDoor.Bifrost.28762
BackDoor.Bifrost.28763
BackDoor.Bifrost.28764
BackDoor.Bifrost.28765
BackDoor.Bifrost.28766
BackDoor.Bifrost.28767
BackDoor.Bifrost.28768
BackDoor.Bifrost.28769
BackDoor.Bifrost.28770
BackDoor.Bifrost.28771
BackDoor.Bifrost.28772
BackDoor.Bifrost.28773
BackDoor.Bifrost.28775
BackDoor.Bifrost.28776
BackDoor.Bifrost.28777
BackDoor.Bifrost.28778
BackDoor.Bifrost.28779
BackDoor.Bifrost.28780
BackDoor.Bifrost.28781
BackDoor.Bifrost.28782
BackDoor.Bifrost.28783
BackDoor.Bifrost.28784
BackDoor.Bifrost.28785
BackDoor.Bifrost.28786
BackDoor.Bifrost.28787
BackDoor.Bifrost.28788
BackDoor.Bifrost.28789
BackDoor.Bifrost.28790
BackDoor.Bifrost.28791
BackDoor.Bifrost.28792
BackDoor.Bifrost.28793
BackDoor.Bifrost.28794
BackDoor.Bifrost.28795
BackDoor.Bifrost.28797
BackDoor.Bifrost.28798
BackDoor.Bifrost.28799
BackDoor.Bifrost.28800
BackDoor.Bifrost.28801
BackDoor.Bifrost.28802
BackDoor.Bifrost.28803
BackDoor.Bifrost.28804
BackDoor.Bifrost.28805
BackDoor.Bifrost.28806
BackDoor.Bifrost.28807
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.