The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42
BackDoor.Bifrost.29619
BackDoor.Bifrost.29621
BackDoor.Bifrost.29622
BackDoor.Bifrost.29623
BackDoor.Bifrost.29625
BackDoor.Bifrost.29626
BackDoor.Bifrost.29627
BackDoor.Bifrost.29628
BackDoor.Bifrost.29629
BackDoor.Bifrost.29632
BackDoor.Bifrost.29633
BackDoor.Bifrost.29635
BackDoor.Bifrost.29636
BackDoor.Bifrost.29637
BackDoor.Bifrost.29638
BackDoor.Bifrost.29640
BackDoor.Bifrost.29644
BackDoor.Bifrost.29654
BackDoor.Bifrost.29655
BackDoor.Bifrost.29656
BackDoor.Bifrost.29657
BackDoor.Bifrost.29658
BackDoor.Bifrost.29659
BackDoor.Bifrost.29661
BackDoor.Bifrost.29667
BackDoor.Bifrost.29669
BackDoor.Bifrost.29671
BackDoor.Bifrost.29683
BackDoor.Bifrost.29684
BackDoor.Bifrost.29715
BackDoor.Bifrost.29739
BackDoor.Bifrost.29743
BackDoor.Bifrost.29765
BackDoor.Bifrost.29781
BackDoor.Bifrost.29784
BackDoor.Bifrost.29787
BackDoor.Bifrost.29791
BackDoor.Bifrost.29798
BackDoor.Bifrost.29799
BackDoor.Bifrost.29804
BackDoor.Bifrost.29809
BackDoor.Bifrost.29811
BackDoor.Bifrost.29831
BackDoor.Bifrost.29835
BackDoor.Bifrost.29837
BackDoor.Bifrost.29841
BackDoor.Bifrost.29847
BackDoor.Bifrost.29869
BackDoor.Bifrost.29879
BackDoor.Bifrost.29881
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.