The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
Trojan.Carberp.2091
Trojan.Carberp.2093
Trojan.Carberp.2094
Trojan.Carberp.2095
Trojan.Carberp.2096
Trojan.Carberp.2097
Trojan.Carberp.2098
Trojan.Carberp.2099
Trojan.Carberp.21
Trojan.Carberp.2100
Trojan.Carberp.2103
Trojan.Carberp.2105
Trojan.Carberp.2107
Trojan.Carberp.2108
Trojan.Carberp.2115
Trojan.Carberp.2119
Trojan.Carberp.2125
Trojan.Carberp.2134
Trojan.Carberp.2150
Trojan.Carberp.2151
Trojan.Carberp.2154
Trojan.Carberp.2159
Trojan.Carberp.2160
Trojan.Carberp.2161
Trojan.Carberp.2183
Trojan.Carberp.2185
Trojan.Carberp.2187
Trojan.Carberp.2191
Trojan.Carberp.2192
Trojan.Carberp.2193
Trojan.Carberp.22
Trojan.Carberp.2219
Trojan.Carberp.2224
Trojan.Carberp.2225
Trojan.Carberp.2226
Trojan.Carberp.2227
Trojan.Carberp.2228
Trojan.Carberp.2229
Trojan.Carberp.223
Trojan.Carberp.2230
Trojan.Carberp.2231
Trojan.Carberp.2232
Trojan.Carberp.2233
Trojan.Carberp.2234
Trojan.Carberp.2235
Trojan.Carberp.2236
Trojan.Carberp.2237
Trojan.Carberp.2238
Trojan.Carberp.2242
Trojan.Carberp.2247
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.