The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42
BackDoor.Bifrost.22103
BackDoor.Bifrost.22104
BackDoor.Bifrost.22105
BackDoor.Bifrost.22106
BackDoor.Bifrost.22107
BackDoor.Bifrost.22108
BackDoor.Bifrost.22109
BackDoor.Bifrost.22118
BackDoor.Bifrost.22123
BackDoor.Bifrost.22125
BackDoor.Bifrost.22130
BackDoor.Bifrost.22132
BackDoor.Bifrost.22138
BackDoor.Bifrost.22140
BackDoor.Bifrost.22141
BackDoor.Bifrost.22142
BackDoor.Bifrost.22145
BackDoor.Bifrost.22146
BackDoor.Bifrost.22149
BackDoor.Bifrost.22150
BackDoor.Bifrost.22151
BackDoor.Bifrost.22152
BackDoor.Bifrost.22153
BackDoor.Bifrost.22154
BackDoor.Bifrost.22155
BackDoor.Bifrost.22156
BackDoor.Bifrost.22157
BackDoor.Bifrost.22158
BackDoor.Bifrost.22159
BackDoor.Bifrost.22160
BackDoor.Bifrost.22163
BackDoor.Bifrost.22164
BackDoor.Bifrost.22165
BackDoor.Bifrost.22166
BackDoor.Bifrost.22167
BackDoor.Bifrost.22168
BackDoor.Bifrost.22169
BackDoor.Bifrost.22170
BackDoor.Bifrost.22171
BackDoor.Bifrost.22172
BackDoor.Bifrost.22173
BackDoor.Bifrost.22175
BackDoor.Bifrost.22229
BackDoor.Bifrost.22257
BackDoor.Bifrost.22299
BackDoor.Bifrost.22321
BackDoor.Bifrost.22358
BackDoor.Bifrost.22366
BackDoor.Bifrost.22374
BackDoor.Bifrost.22416
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.