The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
BackDoor.IRC.Sdbot.10049
BackDoor.IRC.Sdbot.10086
BackDoor.IRC.Sdbot.10356
BackDoor.IRC.Sdbot.10488
BackDoor.IRC.Sdbot.10557
BackDoor.IRC.Sdbot.112.origin
BackDoor.IRC.Sdbot.11212
BackDoor.IRC.Sdbot.11724
BackDoor.IRC.Sdbot.11870
BackDoor.IRC.Sdbot.11899
BackDoor.IRC.Sdbot.12085
BackDoor.IRC.Sdbot.12112
BackDoor.IRC.Sdbot.12126
BackDoor.IRC.Sdbot.12139
BackDoor.IRC.Sdbot.12143
BackDoor.IRC.Sdbot.12211
BackDoor.IRC.Sdbot.12237
BackDoor.IRC.Sdbot.12401
BackDoor.IRC.Sdbot.12461
BackDoor.IRC.Sdbot.12503
BackDoor.IRC.Sdbot.12638
BackDoor.IRC.Sdbot.12724
BackDoor.IRC.Sdbot.12787
BackDoor.IRC.Sdbot.12928
BackDoor.IRC.Sdbot.13077
BackDoor.IRC.Sdbot.13277
BackDoor.IRC.Sdbot.13355
BackDoor.IRC.Sdbot.13472
BackDoor.IRC.Sdbot.13497
BackDoor.IRC.Sdbot.13525
BackDoor.IRC.Sdbot.13889
BackDoor.IRC.Sdbot.13969
BackDoor.IRC.Sdbot.14036
BackDoor.IRC.Sdbot.14070
BackDoor.IRC.Sdbot.14222
BackDoor.IRC.Sdbot.14314
BackDoor.IRC.Sdbot.14359
BackDoor.IRC.Sdbot.15271
BackDoor.IRC.Sdbot.15276
BackDoor.IRC.Sdbot.15303
BackDoor.IRC.Sdbot.15316
BackDoor.IRC.Sdbot.15348
BackDoor.IRC.Sdbot.15368
BackDoor.IRC.Sdbot.15369
BackDoor.IRC.Sdbot.15371
BackDoor.IRC.Sdbot.15436
BackDoor.IRC.Sdbot.15450
BackDoor.IRC.Sdbot.15453
BackDoor.IRC.Sdbot.15474
BackDoor.IRC.Sdbot.15499
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.