The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42
BackDoor.Bifrost.22467
BackDoor.Bifrost.22488
BackDoor.Bifrost.22492
BackDoor.Bifrost.22604
BackDoor.Bifrost.22623
BackDoor.Bifrost.22663
BackDoor.Bifrost.22678
BackDoor.Bifrost.23041
BackDoor.Bifrost.23049
BackDoor.Bifrost.23051
BackDoor.Bifrost.23097
BackDoor.Bifrost.23284
BackDoor.Bifrost.23290
BackDoor.Bifrost.23306
BackDoor.Bifrost.23326
BackDoor.Bifrost.23346
BackDoor.Bifrost.23348
BackDoor.Bifrost.23426
BackDoor.Bifrost.23590
BackDoor.Bifrost.23597
BackDoor.Bifrost.23621
BackDoor.Bifrost.23687
BackDoor.Bifrost.23781
BackDoor.Bifrost.23784
BackDoor.Bifrost.23806
BackDoor.Bifrost.23908
BackDoor.Bifrost.23984
BackDoor.Bifrost.23987
BackDoor.Bifrost.24066
BackDoor.Bifrost.24118
BackDoor.Bifrost.24179
BackDoor.Bifrost.24228
BackDoor.Bifrost.24272
BackDoor.Bifrost.24276
BackDoor.Bifrost.24461
BackDoor.Bifrost.24646
BackDoor.Bifrost.24659
BackDoor.Bifrost.24697
BackDoor.Bifrost.24736
BackDoor.Bifrost.24758
BackDoor.Bifrost.24805
BackDoor.Bifrost.24810
BackDoor.Bifrost.24866
BackDoor.Bifrost.24938
BackDoor.Bifrost.24940
BackDoor.Bifrost.24946
BackDoor.Bifrost.24962
BackDoor.Bifrost.25011
BackDoor.Bifrost.25039
BackDoor.Bifrost.25040
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.