The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
Trojan.Carberp.12
Trojan.Carberp.1208
Trojan.Carberp.1209
Trojan.Carberp.1211
Trojan.Carberp.1212
Trojan.Carberp.1213
Trojan.Carberp.1214
Trojan.Carberp.1215
Trojan.Carberp.1216
Trojan.Carberp.1217
Trojan.Carberp.1218
Trojan.Carberp.1227
Trojan.Carberp.1238
Trojan.Carberp.1248
Trojan.Carberp.1251
Trojan.Carberp.1269
Trojan.Carberp.1284
Trojan.Carberp.1285
Trojan.Carberp.1288
Trojan.Carberp.1292
Trojan.Carberp.1298
Trojan.Carberp.13
Trojan.Carberp.1311
Trojan.Carberp.1316
Trojan.Carberp.1318
Trojan.Carberp.1322
Trojan.Carberp.1325
Trojan.Carberp.1327
Trojan.Carberp.1334
Trojan.Carberp.1339
Trojan.Carberp.1340
Trojan.Carberp.1341
Trojan.Carberp.1346
Trojan.Carberp.1360
Trojan.Carberp.1367
Trojan.Carberp.1369
Trojan.Carberp.1370
Trojan.Carberp.1373
Trojan.Carberp.1384
Trojan.Carberp.1385
Trojan.Carberp.1388
Trojan.Carberp.1391
Trojan.Carberp.1392
Trojan.Carberp.1393
Trojan.Carberp.14
Trojan.Carberp.1402
Trojan.Carberp.1404
Trojan.Carberp.1405
Trojan.Carberp.1410
Trojan.Carberp.1414
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.