The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42
BackDoor.Bifrost.29102
BackDoor.Bifrost.29103
BackDoor.Bifrost.29106
BackDoor.Bifrost.29108
BackDoor.Bifrost.29111
BackDoor.Bifrost.29113
BackDoor.Bifrost.29114
BackDoor.Bifrost.29115
BackDoor.Bifrost.29116
BackDoor.Bifrost.29117
BackDoor.Bifrost.29118
BackDoor.Bifrost.29119
BackDoor.Bifrost.29120
BackDoor.Bifrost.29121
BackDoor.Bifrost.29123
BackDoor.Bifrost.29124
BackDoor.Bifrost.29125
BackDoor.Bifrost.29126
BackDoor.Bifrost.29127
BackDoor.Bifrost.29128
BackDoor.Bifrost.29129
BackDoor.Bifrost.29130
BackDoor.Bifrost.29132
BackDoor.Bifrost.29133
BackDoor.Bifrost.29134
BackDoor.Bifrost.29136
BackDoor.Bifrost.29138
BackDoor.Bifrost.29139
BackDoor.Bifrost.29140
BackDoor.Bifrost.29141
BackDoor.Bifrost.29142
BackDoor.Bifrost.29143
BackDoor.Bifrost.29144
BackDoor.Bifrost.29145
BackDoor.Bifrost.29147
BackDoor.Bifrost.29149
BackDoor.Bifrost.29150
BackDoor.Bifrost.29151
BackDoor.Bifrost.29152
BackDoor.Bifrost.29153
BackDoor.Bifrost.29154
BackDoor.Bifrost.29155
BackDoor.Bifrost.29156
BackDoor.Bifrost.29157
BackDoor.Bifrost.29158
BackDoor.Bifrost.29162
BackDoor.Bifrost.29163
BackDoor.Bifrost.29164
BackDoor.Bifrost.29165
BackDoor.Bifrost.29166
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.