The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42
BackDoor.Bifrost.30514
BackDoor.Bifrost.30515
BackDoor.Bifrost.30516
BackDoor.Bifrost.30517
BackDoor.Bifrost.30518
BackDoor.Bifrost.30520
BackDoor.Bifrost.30524
BackDoor.Bifrost.30532
BackDoor.Bifrost.30537
BackDoor.Bifrost.30557
BackDoor.Bifrost.30558
BackDoor.Bifrost.30567
BackDoor.Bifrost.30569
BackDoor.Bifrost.30606
BackDoor.Bifrost.30609
BackDoor.Bifrost.30617
BackDoor.Bifrost.30705
BackDoor.Bifrost.30707
BackDoor.Bifrost.30729
BackDoor.Bifrost.30730
BackDoor.Bifrost.30736
BackDoor.Bifrost.30753
BackDoor.Bifrost.30825
BackDoor.Bifrost.30835
BackDoor.Bifrost.30837
BackDoor.Bifrost.30846
BackDoor.Bifrost.30855
BackDoor.Bifrost.30892
BackDoor.Bifrost.30919
BackDoor.Bifrost.30954
BackDoor.Bifrost.30957
BackDoor.Bifrost.30960
BackDoor.Bifrost.31004
BackDoor.Bifrost.31007
BackDoor.Bifrost.3704
BackDoor.Bifrost.4024
BackDoor.Bifrost.4188
BackDoor.Bifrost.4193
BackDoor.Bifrost.4424
BackDoor.Bifrost.5528
BackDoor.Bifrost.5871
BackDoor.Bifrost.5900
BackDoor.Bifrost.6324
BackDoor.Bifrost.6567
BackDoor.Bifrost.671
BackDoor.Bifrost.6777
BackDoor.Bifrost.770
BackDoor.Bifrost.7946
BackDoor.Bifrost.8024
BackDoor.Bifrost.8093
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.