The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42
BackDoor.Bifrost.29269
BackDoor.Bifrost.29284
BackDoor.Bifrost.29290
BackDoor.Bifrost.29293
BackDoor.Bifrost.29297
BackDoor.Bifrost.29300
BackDoor.Bifrost.29317
BackDoor.Bifrost.29318
BackDoor.Bifrost.29319
BackDoor.Bifrost.29322
BackDoor.Bifrost.29327
BackDoor.Bifrost.29336
BackDoor.Bifrost.29337
BackDoor.Bifrost.29338
BackDoor.Bifrost.29339
BackDoor.Bifrost.29342
BackDoor.Bifrost.29346
BackDoor.Bifrost.29355
BackDoor.Bifrost.29371
BackDoor.Bifrost.29374
BackDoor.Bifrost.29393
BackDoor.Bifrost.29394
BackDoor.Bifrost.29396
BackDoor.Bifrost.29397
BackDoor.Bifrost.29399
BackDoor.Bifrost.29418
BackDoor.Bifrost.29433
BackDoor.Bifrost.29452
BackDoor.Bifrost.29456
BackDoor.Bifrost.29498
BackDoor.Bifrost.29499
BackDoor.Bifrost.29501
BackDoor.Bifrost.29510
BackDoor.Bifrost.29515
BackDoor.Bifrost.29516
BackDoor.Bifrost.29529
BackDoor.Bifrost.29534
BackDoor.Bifrost.29543
BackDoor.Bifrost.29551
BackDoor.Bifrost.29560
BackDoor.Bifrost.29562
BackDoor.Bifrost.29564
BackDoor.Bifrost.29568
BackDoor.Bifrost.29576
BackDoor.Bifrost.29578
BackDoor.Bifrost.29586
BackDoor.Bifrost.29588
BackDoor.Bifrost.29589
BackDoor.Bifrost.29594
BackDoor.Bifrost.29602
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.