The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
Trojan.Carberp.2343
Trojan.Carberp.2344
Trojan.Carberp.2345
Trojan.Carberp.2347
Trojan.Carberp.2349
Trojan.Carberp.2350
Trojan.Carberp.2351
Trojan.Carberp.2352
Trojan.Carberp.2353
Trojan.Carberp.2354
Trojan.Carberp.2355
Trojan.Carberp.2357
Trojan.Carberp.2358
Trojan.Carberp.2359
Trojan.Carberp.2360
Trojan.Carberp.2362
Trojan.Carberp.2363
Trojan.Carberp.2364
Trojan.Carberp.2365
Trojan.Carberp.2366
Trojan.Carberp.2367
Trojan.Carberp.2368
Trojan.Carberp.2369
Trojan.Carberp.2372
Trojan.Carberp.2373
Trojan.Carberp.2374
Trojan.Carberp.2375
Trojan.Carberp.2376
Trojan.Carberp.2377
Trojan.Carberp.2378
Trojan.Carberp.2379
Trojan.Carberp.2380
Trojan.Carberp.2381
Trojan.Carberp.2382
Trojan.Carberp.2383
Trojan.Carberp.2384
Trojan.Carberp.2385
Trojan.Carberp.2386
Trojan.Carberp.2387
Trojan.Carberp.2388
Trojan.Carberp.2389
Trojan.Carberp.2390
Trojan.Carberp.2391
Trojan.Carberp.2392
Trojan.Carberp.2393
Trojan.Carberp.2394
Trojan.Carberp.2395
Trojan.Carberp.2396
Trojan.Carberp.2397
Trojan.Carberp.2398
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.