The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
Trojan.Carberp.2534
Trojan.Carberp.2535
Trojan.Carberp.2536
Trojan.Carberp.2537
Trojan.Carberp.2538
Trojan.Carberp.2539
Trojan.Carberp.2540
Trojan.Carberp.2541
Trojan.Carberp.2542
Trojan.Carberp.2543
Trojan.Carberp.2544
Trojan.Carberp.2545
Trojan.Carberp.2546
Trojan.Carberp.2547
Trojan.Carberp.2548
Trojan.Carberp.2549
Trojan.Carberp.2550
Trojan.Carberp.2551
Trojan.Carberp.2554
Trojan.Carberp.2555
Trojan.Carberp.2556
Trojan.Carberp.2558
Trojan.Carberp.2559
Trojan.Carberp.2560
Trojan.Carberp.2561
Trojan.Carberp.2562
Trojan.Carberp.2566
Trojan.Carberp.2567
Trojan.Carberp.2568
Trojan.Carberp.2572
Trojan.Carberp.2573
Trojan.Carberp.2574
Trojan.Carberp.2575
Trojan.Carberp.2576
Trojan.Carberp.2577
Trojan.Carberp.2578
Trojan.Carberp.2579
Trojan.Carberp.2580
Trojan.Carberp.2581
Trojan.Carberp.2582
Trojan.Carberp.2583
Trojan.Carberp.2584
Trojan.Carberp.2585
Trojan.Carberp.2586
Trojan.Carberp.2587
Trojan.Carberp.2588
Trojan.Carberp.2589
Trojan.Carberp.2590
Trojan.Carberp.2591
Trojan.Carberp.2592
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.