The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
Name | Vendor | Dr.Web classification name |
---|---|---|
Suspect-1B!B62D579EC9FE | McAfee | Trojan.Packed |
Packed.Win32.Katusha.a | Kaspersky | Trojan.Packed |
Trojan.CryptRedol.Gen.5 | BitDefender | Trojan.Packed |
Trojan.Packed | SunBelt | Trojan.Packed.12396 |
Trojan.Packed | SunBelt | Trojan.Packed.142 |
Trojan.Packed | SunBelt | Trojan.Packed.18745 |
Trojan.Packed.24763
Trojan.Packed.24764
Trojan.Packed.24782
Trojan.Packed.24786
Trojan.Packed.24792
Trojan.Packed.24793
Trojan.Packed.24794
Trojan.Packed.24795
Trojan.Packed.24801
Trojan.Packed.24804
Trojan.Packed.24809
Trojan.Packed.24813
Trojan.Packed.24814
Trojan.Packed.24817
Trojan.Packed.24819
Trojan.Packed.24820
Trojan.Packed.24824
Trojan.Packed.24825
Trojan.Packed.24827
Trojan.Packed.24830
Trojan.Packed.24831
Trojan.Packed.24832
Trojan.Packed.24835
Trojan.Packed.24836
Trojan.Packed.24837
Trojan.Packed.24838
Trojan.Packed.24839
Trojan.Packed.24840
Trojan.Packed.24841
Trojan.Packed.24842
Trojan.Packed.24843
Trojan.Packed.24847
Trojan.Packed.24857
Trojan.Packed.24867
Trojan.Packed.24869
Trojan.Packed.24872
Trojan.Packed.24878
Trojan.Packed.24891
Trojan.Packed.24899
Trojan.Packed.24903
Trojan.Packed.24904
Trojan.Packed.24905
Trojan.Packed.24910
Trojan.Packed.24911
Trojan.Packed.24914
Trojan.Packed.24916
Trojan.Packed.24917
Trojan.Packed.24918
Trojan.Packed.24920
Trojan.Packed.24931
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.