The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
Trojan.Carberp.673
Trojan.Carberp.674
Trojan.Carberp.675
Trojan.Carberp.678
Trojan.Carberp.679
Trojan.Carberp.68
Trojan.Carberp.682
Trojan.Carberp.683
Trojan.Carberp.686
Trojan.Carberp.688
Trojan.Carberp.695
Trojan.Carberp.697
Trojan.Carberp.698
Trojan.Carberp.699
Trojan.Carberp.7
Trojan.Carberp.7.origin
Trojan.Carberp.700
Trojan.Carberp.701
Trojan.Carberp.703
Trojan.Carberp.706
Trojan.Carberp.707
Trojan.Carberp.708
Trojan.Carberp.709
Trojan.Carberp.710
Trojan.Carberp.711
Trojan.Carberp.713
Trojan.Carberp.721
Trojan.Carberp.723
Trojan.Carberp.733
Trojan.Carberp.738
Trojan.Carberp.739
Trojan.Carberp.741
Trojan.Carberp.742
Trojan.Carberp.743
Trojan.Carberp.758
Trojan.Carberp.759
Trojan.Carberp.766
Trojan.Carberp.772
Trojan.Carberp.773
Trojan.Carberp.774
Trojan.Carberp.788
Trojan.Carberp.789
Trojan.Carberp.796
Trojan.Carberp.797
Trojan.Carberp.80
Trojan.Carberp.800
Trojan.Carberp.801
Trojan.Carberp.804
Trojan.Carberp.817
Trojan.Carberp.818
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.