The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
Trojan.Carberp.2255
Trojan.Carberp.2256
Trojan.Carberp.2264
Trojan.Carberp.2265
Trojan.Carberp.2266
Trojan.Carberp.2267
Trojan.Carberp.2268
Trojan.Carberp.2269
Trojan.Carberp.2270
Trojan.Carberp.2272
Trojan.Carberp.2273
Trojan.Carberp.2274
Trojan.Carberp.2276
Trojan.Carberp.2277
Trojan.Carberp.2278
Trojan.Carberp.2279
Trojan.Carberp.2280
Trojan.Carberp.2281
Trojan.Carberp.2282
Trojan.Carberp.2283
Trojan.Carberp.2284
Trojan.Carberp.2285
Trojan.Carberp.2287
Trojan.Carberp.2288
Trojan.Carberp.2291
Trojan.Carberp.2292
Trojan.Carberp.2293
Trojan.Carberp.2295
Trojan.Carberp.2297
Trojan.Carberp.23
Trojan.Carberp.2302
Trojan.Carberp.2303
Trojan.Carberp.2305
Trojan.Carberp.2306
Trojan.Carberp.2307
Trojan.Carberp.2312
Trojan.Carberp.2317
Trojan.Carberp.2318
Trojan.Carberp.2319
Trojan.Carberp.2320
Trojan.Carberp.2321
Trojan.Carberp.2322
Trojan.Carberp.2323
Trojan.Carberp.2331
Trojan.Carberp.2332
Trojan.Carberp.2333
Trojan.Carberp.2334
Trojan.Carberp.2340
Trojan.Carberp.2341
Trojan.Carberp.2342
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.