The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
Name | Vendor | Dr.Web classification name |
---|---|---|
Suspect-1B!B62D579EC9FE | McAfee | Trojan.Packed |
Packed.Win32.Katusha.a | Kaspersky | Trojan.Packed |
Trojan.CryptRedol.Gen.5 | BitDefender | Trojan.Packed |
Trojan.Packed | SunBelt | Trojan.Packed.12396 |
Trojan.Packed | SunBelt | Trojan.Packed.142 |
Trojan.Packed | SunBelt | Trojan.Packed.18745 |
Trojan.Packed.25665
Trojan.Packed.25666
Trojan.Packed.25669
Trojan.Packed.25672
Trojan.Packed.25673
Trojan.Packed.25674
Trojan.Packed.25675
Trojan.Packed.25676
Trojan.Packed.25677
Trojan.Packed.25679
Trojan.Packed.25680
Trojan.Packed.25681
Trojan.Packed.25682
Trojan.Packed.25683
Trojan.Packed.25685
Trojan.Packed.25686
Trojan.Packed.25687
Trojan.Packed.25688
Trojan.Packed.25689
Trojan.Packed.25690
Trojan.Packed.25691
Trojan.Packed.25692
Trojan.Packed.25693
Trojan.Packed.25696
Trojan.Packed.25697
Trojan.Packed.25698
Trojan.Packed.25699
Trojan.Packed.25700
Trojan.Packed.25701
Trojan.Packed.25702
Trojan.Packed.25703
Trojan.Packed.25704
Trojan.Packed.25705
Trojan.Packed.25706
Trojan.Packed.25707
Trojan.Packed.25708
Trojan.Packed.25709
Trojan.Packed.25711
Trojan.Packed.25712
Trojan.Packed.25713
Trojan.Packed.25714
Trojan.Packed.25715
Trojan.Packed.25716
Trojan.Packed.25722
Trojan.Packed.25723
Trojan.Packed.25724
Trojan.Packed.25725
Trojan.Packed.25726
Trojan.Packed.25727
Trojan.Packed.25728
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.