The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
Name | Vendor | Dr.Web classification name |
---|---|---|
Suspect-1B!B62D579EC9FE | McAfee | Trojan.Packed |
Packed.Win32.Katusha.a | Kaspersky | Trojan.Packed |
Trojan.CryptRedol.Gen.5 | BitDefender | Trojan.Packed |
Trojan.Packed | SunBelt | Trojan.Packed.12396 |
Trojan.Packed | SunBelt | Trojan.Packed.142 |
Trojan.Packed | SunBelt | Trojan.Packed.18745 |
Trojan.Packed.23363
Trojan.Packed.23364
Trojan.Packed.23365
Trojan.Packed.23366
Trojan.Packed.23368
Trojan.Packed.23370
Trojan.Packed.23372
Trojan.Packed.23374
Trojan.Packed.23377
Trojan.Packed.23379
Trojan.Packed.23380
Trojan.Packed.23393
Trojan.Packed.23399
Trojan.Packed.23401
Trojan.Packed.23402
Trojan.Packed.23404
Trojan.Packed.23412
Trojan.Packed.23414
Trojan.Packed.23415
Trojan.Packed.23417
Trojan.Packed.23419
Trojan.Packed.23420
Trojan.Packed.23422
Trojan.Packed.23423
Trojan.Packed.23431
Trojan.Packed.23432
Trojan.Packed.23435
Trojan.Packed.23444
Trojan.Packed.23447
Trojan.Packed.23454
Trojan.Packed.23455
Trojan.Packed.23458
Trojan.Packed.23459
Trojan.Packed.23464
Trojan.Packed.23465
Trojan.Packed.23472
Trojan.Packed.23474
Trojan.Packed.23478
Trojan.Packed.23481
Trojan.Packed.23485
Trojan.Packed.23486
Trojan.Packed.23487
Trojan.Packed.23488
Trojan.Packed.23490
Trojan.Packed.23491
Trojan.Packed.23492
Trojan.Packed.23493
Trojan.Packed.23495
Trojan.Packed.23496
Trojan.Packed.23501
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.