The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42
BackDoor.Bifrost.26242
BackDoor.Bifrost.26249
BackDoor.Bifrost.26275
BackDoor.Bifrost.26326
BackDoor.Bifrost.26334
BackDoor.Bifrost.26371
BackDoor.Bifrost.26422
BackDoor.Bifrost.26432
BackDoor.Bifrost.26462
BackDoor.Bifrost.26493
BackDoor.Bifrost.26523
BackDoor.Bifrost.26528
BackDoor.Bifrost.26574
BackDoor.Bifrost.26582
BackDoor.Bifrost.26585
BackDoor.Bifrost.26599
BackDoor.Bifrost.26600
BackDoor.Bifrost.26602
BackDoor.Bifrost.26616
BackDoor.Bifrost.26640
BackDoor.Bifrost.26642
BackDoor.Bifrost.26652
BackDoor.Bifrost.26653
BackDoor.Bifrost.26654
BackDoor.Bifrost.26669
BackDoor.Bifrost.26704
BackDoor.Bifrost.26744
BackDoor.Bifrost.26757
BackDoor.Bifrost.26767
BackDoor.Bifrost.26774
BackDoor.Bifrost.26786
BackDoor.Bifrost.26797
BackDoor.Bifrost.26804
BackDoor.Bifrost.26805
BackDoor.Bifrost.26812
BackDoor.Bifrost.26818
BackDoor.Bifrost.26819
BackDoor.Bifrost.26936
BackDoor.Bifrost.26955
BackDoor.Bifrost.26988
BackDoor.Bifrost.27017
BackDoor.Bifrost.27143
BackDoor.Bifrost.27151
BackDoor.Bifrost.27177
BackDoor.Bifrost.27202
BackDoor.Bifrost.27215
BackDoor.Bifrost.27219
BackDoor.Bifrost.27236
BackDoor.Bifrost.27246
BackDoor.Bifrost.27249
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.