The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
Trojan.Carberp.1834
Trojan.Carberp.1839
Trojan.Carberp.1840
Trojan.Carberp.1895
Trojan.Carberp.1896
Trojan.Carberp.19
Trojan.Carberp.1913
Trojan.Carberp.1916
Trojan.Carberp.1919
Trojan.Carberp.1920
Trojan.Carberp.1921
Trojan.Carberp.1944
Trojan.Carberp.1945
Trojan.Carberp.1946
Trojan.Carberp.1947
Trojan.Carberp.1948
Trojan.Carberp.1949
Trojan.Carberp.1951
Trojan.Carberp.1952
Trojan.Carberp.1953
Trojan.Carberp.1954
Trojan.Carberp.1955
Trojan.Carberp.1956
Trojan.Carberp.1959
Trojan.Carberp.1960
Trojan.Carberp.1961
Trojan.Carberp.1962
Trojan.Carberp.1964
Trojan.Carberp.1965
Trojan.Carberp.1976
Trojan.Carberp.1977
Trojan.Carberp.1978
Trojan.Carberp.1980
Trojan.Carberp.1981
Trojan.Carberp.1982
Trojan.Carberp.1983
Trojan.Carberp.1984
Trojan.Carberp.1985
Trojan.Carberp.1986
Trojan.Carberp.1987
Trojan.Carberp.1988
Trojan.Carberp.1989
Trojan.Carberp.1990
Trojan.Carberp.1991
Trojan.Carberp.1992
Trojan.Carberp.1993
Trojan.Carberp.1994
Trojan.Carberp.1995
Trojan.Carberp.1996
Trojan.Carberp.1998
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.