The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42
BackDoor.Bifrost.28808
BackDoor.Bifrost.28809
BackDoor.Bifrost.28833
BackDoor.Bifrost.28834
BackDoor.Bifrost.28910
BackDoor.Bifrost.28961
BackDoor.Bifrost.29015
BackDoor.Bifrost.29018
BackDoor.Bifrost.29024
BackDoor.Bifrost.29025
BackDoor.Bifrost.29027
BackDoor.Bifrost.29034
BackDoor.Bifrost.29041
BackDoor.Bifrost.29042
BackDoor.Bifrost.29043
BackDoor.Bifrost.29051
BackDoor.Bifrost.29053
BackDoor.Bifrost.29055
BackDoor.Bifrost.29058
BackDoor.Bifrost.29059
BackDoor.Bifrost.29063
BackDoor.Bifrost.29064
BackDoor.Bifrost.29065
BackDoor.Bifrost.29066
BackDoor.Bifrost.29070
BackDoor.Bifrost.29071
BackDoor.Bifrost.29076
BackDoor.Bifrost.29077
BackDoor.Bifrost.29078
BackDoor.Bifrost.29080
BackDoor.Bifrost.29081
BackDoor.Bifrost.29082
BackDoor.Bifrost.29083
BackDoor.Bifrost.29084
BackDoor.Bifrost.29085
BackDoor.Bifrost.29086
BackDoor.Bifrost.29087
BackDoor.Bifrost.29088
BackDoor.Bifrost.29089
BackDoor.Bifrost.29090
BackDoor.Bifrost.29091
BackDoor.Bifrost.29092
BackDoor.Bifrost.29093
BackDoor.Bifrost.29094
BackDoor.Bifrost.29095
BackDoor.Bifrost.29097
BackDoor.Bifrost.29098
BackDoor.Bifrost.29099
BackDoor.Bifrost.29100
BackDoor.Bifrost.29101
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.