The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42
BackDoor.Bifrost.10063
BackDoor.Bifrost.10864
BackDoor.Bifrost.10873
BackDoor.Bifrost.11037
BackDoor.Bifrost.11252
BackDoor.Bifrost.11594
BackDoor.Bifrost.11635
BackDoor.Bifrost.11648
BackDoor.Bifrost.11699
BackDoor.Bifrost.1172
BackDoor.Bifrost.12186
BackDoor.Bifrost.1248
BackDoor.Bifrost.13104
BackDoor.Bifrost.13528
BackDoor.Bifrost.14128
BackDoor.Bifrost.14178
BackDoor.Bifrost.14181
BackDoor.Bifrost.14193
BackDoor.Bifrost.14350
BackDoor.Bifrost.1478
BackDoor.Bifrost.15005
BackDoor.Bifrost.15246
BackDoor.Bifrost.15818
BackDoor.Bifrost.15898
BackDoor.Bifrost.16020
BackDoor.Bifrost.16032
BackDoor.Bifrost.16034
BackDoor.Bifrost.16037
BackDoor.Bifrost.16126
BackDoor.Bifrost.16176
BackDoor.Bifrost.16610
BackDoor.Bifrost.16679
BackDoor.Bifrost.16750
BackDoor.Bifrost.17217
BackDoor.Bifrost.17335
BackDoor.Bifrost.17434
BackDoor.Bifrost.17577
BackDoor.Bifrost.17801
BackDoor.Bifrost.17819
BackDoor.Bifrost.17855
BackDoor.Bifrost.17875
BackDoor.Bifrost.17921
BackDoor.Bifrost.17945
BackDoor.Bifrost.18003
BackDoor.Bifrost.18023
BackDoor.Bifrost.18089
BackDoor.Bifrost.18092
BackDoor.Bifrost.1813
BackDoor.Bifrost.18165
BackDoor.Bifrost.18205
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.