The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42
BackDoor.Bifrost.19.origin
BackDoor.Bifrost.19830
BackDoor.Bifrost.19841
BackDoor.Bifrost.19851
BackDoor.Bifrost.19886
BackDoor.Bifrost.19901
BackDoor.Bifrost.19921
BackDoor.Bifrost.19925
BackDoor.Bifrost.19926
BackDoor.Bifrost.19947
BackDoor.Bifrost.19969
BackDoor.Bifrost.20197
BackDoor.Bifrost.20442
BackDoor.Bifrost.20476
BackDoor.Bifrost.20495
BackDoor.Bifrost.20520
BackDoor.Bifrost.20532
BackDoor.Bifrost.20576
BackDoor.Bifrost.20608
BackDoor.Bifrost.20609
BackDoor.Bifrost.20639
BackDoor.Bifrost.20661
BackDoor.Bifrost.20662
BackDoor.Bifrost.20671
BackDoor.Bifrost.20691
BackDoor.Bifrost.20721
BackDoor.Bifrost.20738
BackDoor.Bifrost.20746
BackDoor.Bifrost.20759
BackDoor.Bifrost.20781
BackDoor.Bifrost.20804
BackDoor.Bifrost.20825
BackDoor.Bifrost.20846
BackDoor.Bifrost.20847
BackDoor.Bifrost.20897
BackDoor.Bifrost.21167
BackDoor.Bifrost.21169
BackDoor.Bifrost.21202
BackDoor.Bifrost.21238
BackDoor.Bifrost.21265
BackDoor.Bifrost.21270
BackDoor.Bifrost.21329
BackDoor.Bifrost.21338
BackDoor.Bifrost.21349
BackDoor.Bifrost.21350
BackDoor.Bifrost.21362
BackDoor.Bifrost.21404
BackDoor.Bifrost.21419
BackDoor.Bifrost.21423
BackDoor.Bifrost.21471
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.