The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42
BackDoor.Bifrost.27259
BackDoor.Bifrost.27265
BackDoor.Bifrost.27271
BackDoor.Bifrost.27276
BackDoor.Bifrost.27280
BackDoor.Bifrost.27281
BackDoor.Bifrost.27282
BackDoor.Bifrost.27286
BackDoor.Bifrost.27287
BackDoor.Bifrost.27291
BackDoor.Bifrost.27299
BackDoor.Bifrost.27305
BackDoor.Bifrost.27335
BackDoor.Bifrost.27339
BackDoor.Bifrost.27341
BackDoor.Bifrost.27351
BackDoor.Bifrost.27376
BackDoor.Bifrost.27378
BackDoor.Bifrost.27392
BackDoor.Bifrost.27412
BackDoor.Bifrost.27430
BackDoor.Bifrost.27465
BackDoor.Bifrost.27467
BackDoor.Bifrost.27477
BackDoor.Bifrost.27495
BackDoor.Bifrost.27618
BackDoor.Bifrost.27620
BackDoor.Bifrost.27622
BackDoor.Bifrost.27729
BackDoor.Bifrost.27780
BackDoor.Bifrost.27796
BackDoor.Bifrost.27825
BackDoor.Bifrost.27849
BackDoor.Bifrost.27885
BackDoor.Bifrost.27901
BackDoor.Bifrost.27904
BackDoor.Bifrost.27922
BackDoor.Bifrost.27946
BackDoor.Bifrost.27966
BackDoor.Bifrost.28003
BackDoor.Bifrost.28012
BackDoor.Bifrost.28020
BackDoor.Bifrost.28035
BackDoor.Bifrost.28037
BackDoor.Bifrost.28043
BackDoor.Bifrost.28049
BackDoor.Bifrost.28075
BackDoor.Bifrost.28079
BackDoor.Bifrost.28090
BackDoor.Bifrost.28094
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.