The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
Name | Vendor | Dr.Web classification name |
---|---|---|
Suspect-1B!B62D579EC9FE | McAfee | Trojan.Packed |
Packed.Win32.Katusha.a | Kaspersky | Trojan.Packed |
Trojan.CryptRedol.Gen.5 | BitDefender | Trojan.Packed |
Trojan.Packed | SunBelt | Trojan.Packed.12396 |
Trojan.Packed | SunBelt | Trojan.Packed.142 |
Trojan.Packed | SunBelt | Trojan.Packed.18745 |
Trojan.Packed.25869
Trojan.Packed.25870
Trojan.Packed.25871
Trojan.Packed.25872
Trojan.Packed.25873
Trojan.Packed.25874
Trojan.Packed.25875
Trojan.Packed.25876
Trojan.Packed.25877
Trojan.Packed.25878
Trojan.Packed.25879
Trojan.Packed.25880
Trojan.Packed.25881
Trojan.Packed.25883
Trojan.Packed.25886
Trojan.Packed.25887
Trojan.Packed.25888
Trojan.Packed.25889
Trojan.Packed.25890
Trojan.Packed.25891
Trojan.Packed.25892
Trojan.Packed.25893
Trojan.Packed.25895
Trojan.Packed.25896
Trojan.Packed.25897
Trojan.Packed.25898
Trojan.Packed.25899
Trojan.Packed.25900
Trojan.Packed.25901
Trojan.Packed.25902
Trojan.Packed.25903
Trojan.Packed.25904
Trojan.Packed.25905
Trojan.Packed.25906
Trojan.Packed.25907
Trojan.Packed.25908
Trojan.Packed.25909
Trojan.Packed.25910
Trojan.Packed.25911
Trojan.Packed.25915
Trojan.Packed.25916
Trojan.Packed.25918
Trojan.Packed.25921
Trojan.Packed.25923
Trojan.Packed.25925
Trojan.Packed.25926
Trojan.Packed.25927
Trojan.Packed.25928
Trojan.Packed.25930
Trojan.Packed.25931
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.