The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42
BackDoor.Bifrost.25041
BackDoor.Bifrost.25042
BackDoor.Bifrost.25055
BackDoor.Bifrost.25119
BackDoor.Bifrost.25197
BackDoor.Bifrost.25203
BackDoor.Bifrost.25207
BackDoor.Bifrost.25208
BackDoor.Bifrost.25229
BackDoor.Bifrost.25232
BackDoor.Bifrost.25301
BackDoor.Bifrost.25315
BackDoor.Bifrost.25338
BackDoor.Bifrost.25359
BackDoor.Bifrost.25393
BackDoor.Bifrost.25396
BackDoor.Bifrost.25419
BackDoor.Bifrost.2548
BackDoor.Bifrost.25571
BackDoor.Bifrost.25637
BackDoor.Bifrost.25642
BackDoor.Bifrost.25699
BackDoor.Bifrost.25709
BackDoor.Bifrost.25719
BackDoor.Bifrost.25830
BackDoor.Bifrost.25831
BackDoor.Bifrost.25864
BackDoor.Bifrost.25961
BackDoor.Bifrost.26031
BackDoor.Bifrost.26064
BackDoor.Bifrost.26081
BackDoor.Bifrost.26095
BackDoor.Bifrost.26127
BackDoor.Bifrost.26146
BackDoor.Bifrost.26147
BackDoor.Bifrost.26150
BackDoor.Bifrost.26155
BackDoor.Bifrost.26157
BackDoor.Bifrost.26161
BackDoor.Bifrost.26168
BackDoor.Bifrost.26171
BackDoor.Bifrost.26176
BackDoor.Bifrost.26178
BackDoor.Bifrost.26179
BackDoor.Bifrost.26188
BackDoor.Bifrost.26208
BackDoor.Bifrost.26217
BackDoor.Bifrost.26237
BackDoor.Bifrost.26238
BackDoor.Bifrost.26241
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.