The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
Linux.Packed.910
Linux.Packed.911
Linux.Packed.912
Linux.Packed.913
Linux.Packed.914
Linux.Packed.915
Linux.Packed.92
Linux.Packed.920
Linux.Packed.921
Linux.Packed.924
Linux.Packed.925
Linux.Packed.926
Linux.Packed.927
Linux.Packed.928
Linux.Packed.929
Linux.Packed.93
Linux.Packed.930
Linux.Packed.931
Linux.Packed.932
Linux.Packed.933
Linux.Packed.934
Linux.Packed.935
Linux.Packed.936
Linux.Packed.937
Linux.Packed.938
Linux.Packed.939
Linux.Packed.94
Linux.Packed.940
Linux.Packed.941
Linux.Packed.942
Linux.Packed.943
Linux.Packed.944
Linux.Packed.945
Linux.Packed.946
Linux.Packed.947
Linux.Packed.948
Linux.Packed.949
Linux.Packed.95
Linux.Packed.950
Linux.Packed.951
Linux.Packed.952
Linux.Packed.953
Linux.Packed.954
Linux.Packed.955
Linux.Packed.956
Linux.Packed.957
Linux.Packed.958
Linux.Packed.959
Linux.Packed.96
Linux.Packed.960
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.