The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
Trojan.Carberp.445
Trojan.Carberp.45
Trojan.Carberp.450
Trojan.Carberp.47
Trojan.Carberp.471
Trojan.Carberp.476
Trojan.Carberp.48
Trojan.Carberp.482
Trojan.Carberp.483
Trojan.Carberp.486
Trojan.Carberp.487
Trojan.Carberp.49
Trojan.Carberp.492
Trojan.Carberp.493
Trojan.Carberp.497
Trojan.Carberp.5
Trojan.Carberp.50
Trojan.Carberp.506
Trojan.Carberp.519
Trojan.Carberp.528
Trojan.Carberp.53
Trojan.Carberp.54
Trojan.Carberp.553
Trojan.Carberp.558
Trojan.Carberp.57
Trojan.Carberp.576
Trojan.Carberp.59
Trojan.Carberp.599
Trojan.Carberp.60
Trojan.Carberp.600
Trojan.Carberp.602
Trojan.Carberp.61
Trojan.Carberp.636
Trojan.Carberp.637
Trojan.Carberp.647
Trojan.Carberp.648
Trojan.Carberp.649
Trojan.Carberp.653
Trojan.Carberp.654
Trojan.Carberp.657
Trojan.Carberp.658
Trojan.Carberp.659
Trojan.Carberp.660
Trojan.Carberp.661
Trojan.Carberp.662
Trojan.Carberp.663
Trojan.Carberp.665
Trojan.Carberp.667
Trojan.Carberp.669
Trojan.Carberp.671
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.