The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
Trojan.Carberp.1416
Trojan.Carberp.1417
Trojan.Carberp.1421
Trojan.Carberp.1422
Trojan.Carberp.1449
Trojan.Carberp.1452
Trojan.Carberp.1454
Trojan.Carberp.1456
Trojan.Carberp.1457
Trojan.Carberp.1459
Trojan.Carberp.1461
Trojan.Carberp.1462
Trojan.Carberp.1467
Trojan.Carberp.1469
Trojan.Carberp.1470
Trojan.Carberp.1471
Trojan.Carberp.1472
Trojan.Carberp.1473
Trojan.Carberp.1475
Trojan.Carberp.1476
Trojan.Carberp.1478
Trojan.Carberp.1480
Trojan.Carberp.1481
Trojan.Carberp.1483
Trojan.Carberp.1485
Trojan.Carberp.1486
Trojan.Carberp.1487
Trojan.Carberp.1488
Trojan.Carberp.1489
Trojan.Carberp.1496
Trojan.Carberp.1499
Trojan.Carberp.15
Trojan.Carberp.1501
Trojan.Carberp.1503
Trojan.Carberp.1504
Trojan.Carberp.1505
Trojan.Carberp.1506
Trojan.Carberp.1507
Trojan.Carberp.1509
Trojan.Carberp.1514
Trojan.Carberp.1515
Trojan.Carberp.1521
Trojan.Carberp.1593
Trojan.Carberp.1594
Trojan.Carberp.1595
Trojan.Carberp.1596
Trojan.Carberp.1597
Trojan.Carberp.1598
Trojan.Carberp.1599
Trojan.Carberp.16
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.