The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42
BackDoor.Bifrost.21488
BackDoor.Bifrost.21491
BackDoor.Bifrost.21547
BackDoor.Bifrost.21556
BackDoor.Bifrost.21569
BackDoor.Bifrost.21570
BackDoor.Bifrost.21592
BackDoor.Bifrost.21604
BackDoor.Bifrost.21618
BackDoor.Bifrost.21713
BackDoor.Bifrost.21727
BackDoor.Bifrost.21738
BackDoor.Bifrost.21767
BackDoor.Bifrost.21804
BackDoor.Bifrost.21822
BackDoor.Bifrost.21905
BackDoor.Bifrost.22035
BackDoor.Bifrost.22045
BackDoor.Bifrost.22046
BackDoor.Bifrost.22047
BackDoor.Bifrost.22048
BackDoor.Bifrost.22049
BackDoor.Bifrost.22050
BackDoor.Bifrost.22051
BackDoor.Bifrost.22052
BackDoor.Bifrost.22053
BackDoor.Bifrost.22054
BackDoor.Bifrost.22061
BackDoor.Bifrost.22064
BackDoor.Bifrost.22065
BackDoor.Bifrost.22066
BackDoor.Bifrost.22068
BackDoor.Bifrost.22074
BackDoor.Bifrost.22086
BackDoor.Bifrost.22087
BackDoor.Bifrost.22088
BackDoor.Bifrost.22089
BackDoor.Bifrost.22090
BackDoor.Bifrost.22091
BackDoor.Bifrost.22092
BackDoor.Bifrost.22093
BackDoor.Bifrost.22094
BackDoor.Bifrost.22095
BackDoor.Bifrost.22096
BackDoor.Bifrost.22097
BackDoor.Bifrost.22098
BackDoor.Bifrost.22099
BackDoor.Bifrost.22100
BackDoor.Bifrost.22101
BackDoor.Bifrost.22102
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.