The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42
BackDoor.Bifrost.28095
BackDoor.Bifrost.28112
BackDoor.Bifrost.28113
BackDoor.Bifrost.28194
BackDoor.Bifrost.28197
BackDoor.Bifrost.28198
BackDoor.Bifrost.28199
BackDoor.Bifrost.28201
BackDoor.Bifrost.28206
BackDoor.Bifrost.28207
BackDoor.Bifrost.28208
BackDoor.Bifrost.28209
BackDoor.Bifrost.28210
BackDoor.Bifrost.28211
BackDoor.Bifrost.28212
BackDoor.Bifrost.28213
BackDoor.Bifrost.28215
BackDoor.Bifrost.28216
BackDoor.Bifrost.28217
BackDoor.Bifrost.28219
BackDoor.Bifrost.28220
BackDoor.Bifrost.28221
BackDoor.Bifrost.28222
BackDoor.Bifrost.28223
BackDoor.Bifrost.28224
BackDoor.Bifrost.28236
BackDoor.Bifrost.28237
BackDoor.Bifrost.28238
BackDoor.Bifrost.28239
BackDoor.Bifrost.28240
BackDoor.Bifrost.28241
BackDoor.Bifrost.28242
BackDoor.Bifrost.28243
BackDoor.Bifrost.28244
BackDoor.Bifrost.28245
BackDoor.Bifrost.28246
BackDoor.Bifrost.28247
BackDoor.Bifrost.28248
BackDoor.Bifrost.28249
BackDoor.Bifrost.28250
BackDoor.Bifrost.28251
BackDoor.Bifrost.28252
BackDoor.Bifrost.28253
BackDoor.Bifrost.28254
BackDoor.Bifrost.28255
BackDoor.Bifrost.28256
BackDoor.Bifrost.28258
BackDoor.Bifrost.28259
BackDoor.Bifrost.28260
BackDoor.Bifrost.28261
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.