Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Trojan.Mayachok in virus library:

Trojan.Mayachok.1774
Trojan.Mayachok.17741
Trojan.Mayachok.17742
Trojan.Mayachok.17743
Trojan.Mayachok.17744
Trojan.Mayachok.17745
Trojan.Mayachok.17748
Trojan.Mayachok.17749
Trojan.Mayachok.1775
Trojan.Mayachok.17750
Trojan.Mayachok.17751
Trojan.Mayachok.17752
Trojan.Mayachok.17753
Trojan.Mayachok.17754
Trojan.Mayachok.17755
Trojan.Mayachok.17756
Trojan.Mayachok.17757
Trojan.Mayachok.17758
Trojan.Mayachok.17759
Trojan.Mayachok.1776
Trojan.Mayachok.17760
Trojan.Mayachok.17761
Trojan.Mayachok.17763
Trojan.Mayachok.17764
Trojan.Mayachok.17765
Trojan.Mayachok.17766
Trojan.Mayachok.17767
Trojan.Mayachok.17768
Trojan.Mayachok.17769
Trojan.Mayachok.1777
Trojan.Mayachok.17770
Trojan.Mayachok.17771
Trojan.Mayachok.1778
Trojan.Mayachok.17780
Trojan.Mayachok.17781
Trojan.Mayachok.17782
Trojan.Mayachok.17783
Trojan.Mayachok.17784
Trojan.Mayachok.17785
Trojan.Mayachok.17786
Trojan.Mayachok.17788
Trojan.Mayachok.17789
Trojan.Mayachok.1779
Trojan.Mayachok.17790
Trojan.Mayachok.17791
Trojan.Mayachok.17792
Trojan.Mayachok.17793
Trojan.Mayachok.17794
Trojan.Mayachok.17795
Trojan.Mayachok.17796

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.