The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42
BackDoor.Bifrost.30009
BackDoor.Bifrost.30010
BackDoor.Bifrost.30012
BackDoor.Bifrost.30013
BackDoor.Bifrost.30014
BackDoor.Bifrost.30015
BackDoor.Bifrost.30016
BackDoor.Bifrost.30017
BackDoor.Bifrost.30018
BackDoor.Bifrost.30019
BackDoor.Bifrost.30020
BackDoor.Bifrost.30021
BackDoor.Bifrost.30022
BackDoor.Bifrost.30025
BackDoor.Bifrost.30026
BackDoor.Bifrost.30027
BackDoor.Bifrost.30028
BackDoor.Bifrost.30029
BackDoor.Bifrost.30030
BackDoor.Bifrost.30031
BackDoor.Bifrost.30034
BackDoor.Bifrost.30035
BackDoor.Bifrost.30036
BackDoor.Bifrost.30037
BackDoor.Bifrost.30038
BackDoor.Bifrost.30039
BackDoor.Bifrost.30041
BackDoor.Bifrost.30043
BackDoor.Bifrost.30044
BackDoor.Bifrost.30046
BackDoor.Bifrost.30055
BackDoor.Bifrost.30056
BackDoor.Bifrost.30058
BackDoor.Bifrost.30073
BackDoor.Bifrost.30088
BackDoor.Bifrost.30091
BackDoor.Bifrost.30101
BackDoor.Bifrost.30107
BackDoor.Bifrost.30110
BackDoor.Bifrost.30112
BackDoor.Bifrost.30120
BackDoor.Bifrost.30125
BackDoor.Bifrost.30136
BackDoor.Bifrost.30149
BackDoor.Bifrost.30151
BackDoor.Bifrost.30156
BackDoor.Bifrost.30159
BackDoor.Bifrost.30181
BackDoor.Bifrost.30221
BackDoor.Bifrost.30222
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.