The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
Trojan.Carberp.2811
Trojan.Carberp.2812
Trojan.Carberp.2813
Trojan.Carberp.2814
Trojan.Carberp.2816
Trojan.Carberp.2818
Trojan.Carberp.2820
Trojan.Carberp.2821
Trojan.Carberp.2822
Trojan.Carberp.2823
Trojan.Carberp.2827
Trojan.Carberp.2828
Trojan.Carberp.2846
Trojan.Carberp.29
Trojan.Carberp.298
Trojan.Carberp.299
Trojan.Carberp.3
Trojan.Carberp.30
Trojan.Carberp.300
Trojan.Carberp.307
Trojan.Carberp.308
Trojan.Carberp.309
Trojan.Carberp.32
Trojan.Carberp.33
Trojan.Carberp.332
Trojan.Carberp.339
Trojan.Carberp.34
Trojan.Carberp.340
Trojan.Carberp.345
Trojan.Carberp.350
Trojan.Carberp.355
Trojan.Carberp.357
Trojan.Carberp.361
Trojan.Carberp.37
Trojan.Carberp.370
Trojan.Carberp.384
Trojan.Carberp.385
Trojan.Carberp.39
Trojan.Carberp.394
Trojan.Carberp.397
Trojan.Carberp.404
Trojan.Carberp.408
Trojan.Carberp.412
Trojan.Carberp.417
Trojan.Carberp.423
Trojan.Carberp.429
Trojan.Carberp.431
Trojan.Carberp.432
Trojan.Carberp.438
Trojan.Carberp.444
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.