The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
Trojan.Carberp.1999
Trojan.Carberp.20
Trojan.Carberp.2002
Trojan.Carberp.2004
Trojan.Carberp.2005
Trojan.Carberp.2006
Trojan.Carberp.2007
Trojan.Carberp.2009
Trojan.Carberp.2010
Trojan.Carberp.2011
Trojan.Carberp.2038
Trojan.Carberp.2039
Trojan.Carberp.2040
Trojan.Carberp.2041
Trojan.Carberp.2042
Trojan.Carberp.2043
Trojan.Carberp.2044
Trojan.Carberp.2045
Trojan.Carberp.2046
Trojan.Carberp.2047
Trojan.Carberp.2048
Trojan.Carberp.2049
Trojan.Carberp.2050
Trojan.Carberp.2051
Trojan.Carberp.2052
Trojan.Carberp.2053
Trojan.Carberp.2057
Trojan.Carberp.2058
Trojan.Carberp.2060
Trojan.Carberp.2061
Trojan.Carberp.2062
Trojan.Carberp.2063
Trojan.Carberp.2065
Trojan.Carberp.2070
Trojan.Carberp.2071
Trojan.Carberp.2072
Trojan.Carberp.2073
Trojan.Carberp.2074
Trojan.Carberp.2078
Trojan.Carberp.2079
Trojan.Carberp.208
Trojan.Carberp.2081
Trojan.Carberp.2082
Trojan.Carberp.2083
Trojan.Carberp.2084
Trojan.Carberp.2085
Trojan.Carberp.2086
Trojan.Carberp.2089
Trojan.Carberp.209
Trojan.Carberp.2090
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.