The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42
BackDoor.Bifrost.29887
BackDoor.Bifrost.29919
BackDoor.Bifrost.29940
BackDoor.Bifrost.29941
BackDoor.Bifrost.29942
BackDoor.Bifrost.29943
BackDoor.Bifrost.29953
BackDoor.Bifrost.29954
BackDoor.Bifrost.29957
BackDoor.Bifrost.29958
BackDoor.Bifrost.29962
BackDoor.Bifrost.29963
BackDoor.Bifrost.29964
BackDoor.Bifrost.29965
BackDoor.Bifrost.29966
BackDoor.Bifrost.29969
BackDoor.Bifrost.29971
BackDoor.Bifrost.29972
BackDoor.Bifrost.29973
BackDoor.Bifrost.29974
BackDoor.Bifrost.29975
BackDoor.Bifrost.29976
BackDoor.Bifrost.29977
BackDoor.Bifrost.29978
BackDoor.Bifrost.29979
BackDoor.Bifrost.29980
BackDoor.Bifrost.29981
BackDoor.Bifrost.29982
BackDoor.Bifrost.29983
BackDoor.Bifrost.29984
BackDoor.Bifrost.29985
BackDoor.Bifrost.29986
BackDoor.Bifrost.29987
BackDoor.Bifrost.29988
BackDoor.Bifrost.29989
BackDoor.Bifrost.29990
BackDoor.Bifrost.29991
BackDoor.Bifrost.29992
BackDoor.Bifrost.29993
BackDoor.Bifrost.29994
BackDoor.Bifrost.29998
BackDoor.Bifrost.30000
BackDoor.Bifrost.30001
BackDoor.Bifrost.30002
BackDoor.Bifrost.30003
BackDoor.Bifrost.30004
BackDoor.Bifrost.30005
BackDoor.Bifrost.30006
BackDoor.Bifrost.30007
BackDoor.Bifrost.30008
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.