The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
Trojan.Carberp.2652
Trojan.Carberp.2653
Trojan.Carberp.2654
Trojan.Carberp.2655
Trojan.Carberp.2656
Trojan.Carberp.2657
Trojan.Carberp.2658
Trojan.Carberp.2659
Trojan.Carberp.2660
Trojan.Carberp.2661
Trojan.Carberp.2662
Trojan.Carberp.2664
Trojan.Carberp.2665
Trojan.Carberp.2666
Trojan.Carberp.2667
Trojan.Carberp.2668
Trojan.Carberp.2669
Trojan.Carberp.2671
Trojan.Carberp.2672
Trojan.Carberp.2673
Trojan.Carberp.2674
Trojan.Carberp.2675
Trojan.Carberp.2676
Trojan.Carberp.2677
Trojan.Carberp.2678
Trojan.Carberp.2679
Trojan.Carberp.2681
Trojan.Carberp.2682
Trojan.Carberp.2685
Trojan.Carberp.2686
Trojan.Carberp.2687
Trojan.Carberp.2688
Trojan.Carberp.2689
Trojan.Carberp.2690
Trojan.Carberp.2691
Trojan.Carberp.2692
Trojan.Carberp.2693
Trojan.Carberp.2694
Trojan.Carberp.2695
Trojan.Carberp.2697
Trojan.Carberp.2698
Trojan.Carberp.2699
Trojan.Carberp.2700
Trojan.Carberp.2701
Trojan.Carberp.2702
Trojan.Carberp.2703
Trojan.Carberp.2704
Trojan.Carberp.2708
Trojan.Carberp.2709
Trojan.Carberp.2710
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.