The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
Name | Vendor | Dr.Web classification name |
---|---|---|
Suspect-1B!B62D579EC9FE | McAfee | Trojan.Packed |
Packed.Win32.Katusha.a | Kaspersky | Trojan.Packed |
Trojan.CryptRedol.Gen.5 | BitDefender | Trojan.Packed |
Trojan.Packed | SunBelt | Trojan.Packed.12396 |
Trojan.Packed | SunBelt | Trojan.Packed.142 |
Trojan.Packed | SunBelt | Trojan.Packed.18745 |
Trojan.Packed.25354
Trojan.Packed.25360
Trojan.Packed.25362
Trojan.Packed.25363
Trojan.Packed.25365
Trojan.Packed.25366
Trojan.Packed.25367
Trojan.Packed.25371
Trojan.Packed.25376
Trojan.Packed.25379
Trojan.Packed.25381
Trojan.Packed.25385
Trojan.Packed.25386
Trojan.Packed.25387
Trojan.Packed.25388
Trojan.Packed.25392
Trojan.Packed.25394
Trojan.Packed.25402
Trojan.Packed.25405
Trojan.Packed.25410
Trojan.Packed.25415
Trojan.Packed.25418
Trojan.Packed.25420
Trojan.Packed.25422
Trojan.Packed.25434
Trojan.Packed.25435
Trojan.Packed.25439
Trojan.Packed.25441
Trojan.Packed.25446
Trojan.Packed.25447
Trojan.Packed.25453
Trojan.Packed.25456
Trojan.Packed.25458
Trojan.Packed.25460
Trojan.Packed.25465
Trojan.Packed.25468
Trojan.Packed.25469
Trojan.Packed.25470
Trojan.Packed.25473
Trojan.Packed.25474
Trojan.Packed.25475
Trojan.Packed.25478
Trojan.Packed.25481
Trojan.Packed.25482
Trojan.Packed.25484
Trojan.Packed.25488
Trojan.Packed.25489
Trojan.Packed.25490
Trojan.Packed.25491
Trojan.Packed.25492
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.