The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42
BackDoor.Bifrost.30230
BackDoor.Bifrost.30236
BackDoor.Bifrost.30253
BackDoor.Bifrost.30254
BackDoor.Bifrost.30257
BackDoor.Bifrost.30272
BackDoor.Bifrost.30275
BackDoor.Bifrost.30278
BackDoor.Bifrost.30280
BackDoor.Bifrost.30288
BackDoor.Bifrost.30298
BackDoor.Bifrost.30299
BackDoor.Bifrost.30300
BackDoor.Bifrost.30349
BackDoor.Bifrost.30352
BackDoor.Bifrost.30353
BackDoor.Bifrost.30357
BackDoor.Bifrost.30362
BackDoor.Bifrost.30390
BackDoor.Bifrost.30405
BackDoor.Bifrost.30406
BackDoor.Bifrost.30409
BackDoor.Bifrost.30411
BackDoor.Bifrost.30423
BackDoor.Bifrost.30435
BackDoor.Bifrost.30437
BackDoor.Bifrost.30454
BackDoor.Bifrost.30455
BackDoor.Bifrost.30456
BackDoor.Bifrost.30457
BackDoor.Bifrost.30458
BackDoor.Bifrost.30459
BackDoor.Bifrost.30463
BackDoor.Bifrost.30464
BackDoor.Bifrost.30465
BackDoor.Bifrost.30469
BackDoor.Bifrost.30473
BackDoor.Bifrost.30496
BackDoor.Bifrost.30498
BackDoor.Bifrost.30502
BackDoor.Bifrost.30503
BackDoor.Bifrost.30504
BackDoor.Bifrost.30505
BackDoor.Bifrost.30507
BackDoor.Bifrost.30508
BackDoor.Bifrost.30509
BackDoor.Bifrost.30510
BackDoor.Bifrost.30511
BackDoor.Bifrost.30512
BackDoor.Bifrost.30513
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.