The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
Trojan.Carberp.2711
Trojan.Carberp.2712
Trojan.Carberp.2713
Trojan.Carberp.2715
Trojan.Carberp.2716
Trojan.Carberp.2717
Trojan.Carberp.2719
Trojan.Carberp.2721
Trojan.Carberp.2725
Trojan.Carberp.2727
Trojan.Carberp.2728
Trojan.Carberp.2731
Trojan.Carberp.2732
Trojan.Carberp.2734
Trojan.Carberp.2736
Trojan.Carberp.2737
Trojan.Carberp.2739
Trojan.Carberp.2740
Trojan.Carberp.2741
Trojan.Carberp.2742
Trojan.Carberp.2743
Trojan.Carberp.2744
Trojan.Carberp.2748
Trojan.Carberp.2749
Trojan.Carberp.2750
Trojan.Carberp.2751
Trojan.Carberp.2755
Trojan.Carberp.2757
Trojan.Carberp.2759
Trojan.Carberp.276
Trojan.Carberp.2760
Trojan.Carberp.2761
Trojan.Carberp.2762
Trojan.Carberp.2763
Trojan.Carberp.2764
Trojan.Carberp.2766
Trojan.Carberp.2767
Trojan.Carberp.2770
Trojan.Carberp.2771
Trojan.Carberp.2773
Trojan.Carberp.2789
Trojan.Carberp.2793
Trojan.Carberp.2796
Trojan.Carberp.2797
Trojan.Carberp.2805
Trojan.Carberp.2806
Trojan.Carberp.2807
Trojan.Carberp.2808
Trojan.Carberp.2809
Trojan.Carberp.2810
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.