The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42
BackDoor.Bifrost.29173
BackDoor.Bifrost.29178
BackDoor.Bifrost.29179
BackDoor.Bifrost.29180
BackDoor.Bifrost.29181
BackDoor.Bifrost.29182
BackDoor.Bifrost.29183
BackDoor.Bifrost.29191
BackDoor.Bifrost.29192
BackDoor.Bifrost.29193
BackDoor.Bifrost.29194
BackDoor.Bifrost.29195
BackDoor.Bifrost.29197
BackDoor.Bifrost.29199
BackDoor.Bifrost.29203
BackDoor.Bifrost.29208
BackDoor.Bifrost.29210
BackDoor.Bifrost.29211
BackDoor.Bifrost.29212
BackDoor.Bifrost.29215
BackDoor.Bifrost.29218
BackDoor.Bifrost.29219
BackDoor.Bifrost.29220
BackDoor.Bifrost.29221
BackDoor.Bifrost.29222
BackDoor.Bifrost.29223
BackDoor.Bifrost.29224
BackDoor.Bifrost.29226
BackDoor.Bifrost.29228
BackDoor.Bifrost.29230
BackDoor.Bifrost.29233
BackDoor.Bifrost.29235
BackDoor.Bifrost.29236
BackDoor.Bifrost.29237
BackDoor.Bifrost.29239
BackDoor.Bifrost.29240
BackDoor.Bifrost.29241
BackDoor.Bifrost.29242
BackDoor.Bifrost.29245
BackDoor.Bifrost.29250
BackDoor.Bifrost.29252
BackDoor.Bifrost.29253
BackDoor.Bifrost.29257
BackDoor.Bifrost.29258
BackDoor.Bifrost.29259
BackDoor.Bifrost.29260
BackDoor.Bifrost.29261
BackDoor.Bifrost.29262
BackDoor.Bifrost.29263
BackDoor.Bifrost.29265
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.