The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
Trojan.Mayachok.18616
Trojan.Mayachok.18617
Trojan.Mayachok.18621
Trojan.Mayachok.18622
Trojan.Mayachok.18624
Trojan.Mayachok.18626
Trojan.Mayachok.18628
Trojan.Mayachok.18630
Trojan.Mayachok.18631
Trojan.Mayachok.18633
Trojan.Mayachok.18634
Trojan.Mayachok.18655
Trojan.Mayachok.18659
Trojan.Mayachok.18669
Trojan.Mayachok.18711
Trojan.Mayachok.18717
Trojan.Mayachok.18718
Trojan.Mayachok.18734
Trojan.Mayachok.18735
Trojan.Mayachok.18737
Trojan.Mayachok.18744
Trojan.Mayachok.18745
Trojan.Mayachok.18746
Trojan.Mayachok.18747
Trojan.Mayachok.18748
Trojan.Mayachok.18750
Trojan.Mayachok.18751
Trojan.Mayachok.18752
Trojan.Mayachok.18753
Trojan.Mayachok.18754
Trojan.Mayachok.18755
Trojan.Mayachok.18756
Trojan.Mayachok.18757
Trojan.Mayachok.18758
Trojan.Mayachok.18759
Trojan.Mayachok.18760
Trojan.Mayachok.18762
Trojan.Mayachok.18763
Trojan.Mayachok.18764
Trojan.Mayachok.18765
Trojan.Mayachok.18767
Trojan.Mayachok.18769
Trojan.Mayachok.18770
Trojan.Mayachok.18771
Trojan.Mayachok.18772
Trojan.Mayachok.18773
Trojan.Mayachok.18785
Trojan.Mayachok.18786
Trojan.Mayachok.18787
Trojan.Mayachok.18788
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.