The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
Trojan.Carberp.1600
Trojan.Carberp.1601
Trojan.Carberp.1602
Trojan.Carberp.1603
Trojan.Carberp.1604
Trojan.Carberp.1605
Trojan.Carberp.1608
Trojan.Carberp.1609
Trojan.Carberp.1611
Trojan.Carberp.1613
Trojan.Carberp.1614
Trojan.Carberp.1616
Trojan.Carberp.1617
Trojan.Carberp.1628
Trojan.Carberp.1635
Trojan.Carberp.1642
Trojan.Carberp.1652
Trojan.Carberp.1653
Trojan.Carberp.1655
Trojan.Carberp.1656
Trojan.Carberp.1672
Trojan.Carberp.169
Trojan.Carberp.1693
Trojan.Carberp.1696
Trojan.Carberp.1713
Trojan.Carberp.1719
Trojan.Carberp.1738
Trojan.Carberp.1740
Trojan.Carberp.1742
Trojan.Carberp.1751
Trojan.Carberp.1752
Trojan.Carberp.1753
Trojan.Carberp.1755
Trojan.Carberp.1758
Trojan.Carberp.1759
Trojan.Carberp.1761
Trojan.Carberp.1763
Trojan.Carberp.1765
Trojan.Carberp.1769
Trojan.Carberp.1770
Trojan.Carberp.1771
Trojan.Carberp.1778
Trojan.Carberp.1779
Trojan.Carberp.1781
Trojan.Carberp.1783
Trojan.Carberp.1786
Trojan.Carberp.1789
Trojan.Carberp.1823
Trojan.Carberp.1833
Trojan.Carberp.1834
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.
Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies