The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
Name | Vendor | Dr.Web classification name |
---|---|---|
Suspect-1B!B62D579EC9FE | McAfee | Trojan.Packed |
Packed.Win32.Katusha.a | Kaspersky | Trojan.Packed |
Trojan.CryptRedol.Gen.5 | BitDefender | Trojan.Packed |
Trojan.Packed | SunBelt | Trojan.Packed.12396 |
Trojan.Packed | SunBelt | Trojan.Packed.142 |
Trojan.Packed | SunBelt | Trojan.Packed.18745 |
Trojan.Packed.24226
Trojan.Packed.24227
Trojan.Packed.24230
Trojan.Packed.24232
Trojan.Packed.24240
Trojan.Packed.24241
Trojan.Packed.24245
Trojan.Packed.24248
Trojan.Packed.24249
Trojan.Packed.24250
Trojan.Packed.24252
Trojan.Packed.24263
Trojan.Packed.24270
Trojan.Packed.24286
Trojan.Packed.24288
Trojan.Packed.24293
Trojan.Packed.24307
Trojan.Packed.24313
Trojan.Packed.24317
Trojan.Packed.24318
Trojan.Packed.24320
Trojan.Packed.24321
Trojan.Packed.24324
Trojan.Packed.24325
Trojan.Packed.24327
Trojan.Packed.24328
Trojan.Packed.24329
Trojan.Packed.24331
Trojan.Packed.24332
Trojan.Packed.24338
Trojan.Packed.24346
Trojan.Packed.24347
Trojan.Packed.24349
Trojan.Packed.24352
Trojan.Packed.24355
Trojan.Packed.24356
Trojan.Packed.24357
Trojan.Packed.24363
Trojan.Packed.24365
Trojan.Packed.24366
Trojan.Packed.24377
Trojan.Packed.24380
Trojan.Packed.24381
Trojan.Packed.24383
Trojan.Packed.24384
Trojan.Packed.24385
Trojan.Packed.24388
Trojan.Packed.24391
Trojan.Packed.24395
Trojan.Packed.24402
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.