Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Trojan.Mayachok in virus library:

Trojan.Mayachok.1324
Trojan.Mayachok.1325
Trojan.Mayachok.1326
Trojan.Mayachok.1327
Trojan.Mayachok.1328
Trojan.Mayachok.1329
Trojan.Mayachok.1330
Trojan.Mayachok.1331
Trojan.Mayachok.1332
Trojan.Mayachok.1333
Trojan.Mayachok.1334
Trojan.Mayachok.1335
Trojan.Mayachok.1336
Trojan.Mayachok.1337
Trojan.Mayachok.1338
Trojan.Mayachok.1339
Trojan.Mayachok.1340
Trojan.Mayachok.1341
Trojan.Mayachok.1342
Trojan.Mayachok.1343
Trojan.Mayachok.1344
Trojan.Mayachok.13444
Trojan.Mayachok.13445
Trojan.Mayachok.13447
Trojan.Mayachok.13448
Trojan.Mayachok.1345
Trojan.Mayachok.13454
Trojan.Mayachok.13456
Trojan.Mayachok.13457
Trojan.Mayachok.1346
Trojan.Mayachok.13465
Trojan.Mayachok.13467
Trojan.Mayachok.1347
Trojan.Mayachok.13471
Trojan.Mayachok.13472
Trojan.Mayachok.13476
Trojan.Mayachok.13478
Trojan.Mayachok.1348
Trojan.Mayachok.13481
Trojan.Mayachok.13483
Trojan.Mayachok.13487
Trojan.Mayachok.1349
Trojan.Mayachok.1350
Trojan.Mayachok.1351
Trojan.Mayachok.1352
Trojan.Mayachok.1353
Trojan.Mayachok.1354
Trojan.Mayachok.1355
Trojan.Mayachok.1356
Trojan.Mayachok.1357

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.