The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
Name | Vendor | Dr.Web classification name |
---|---|---|
Suspect-1B!B62D579EC9FE | McAfee | Trojan.Packed |
Packed.Win32.Katusha.a | Kaspersky | Trojan.Packed |
Trojan.CryptRedol.Gen.5 | BitDefender | Trojan.Packed |
Trojan.Packed | SunBelt | Trojan.Packed.12396 |
Trojan.Packed | SunBelt | Trojan.Packed.142 |
Trojan.Packed | SunBelt | Trojan.Packed.18745 |
Trojan.Packed.28419
Trojan.Packed.28421
Trojan.Packed.28423
Trojan.Packed.28424
Trojan.Packed.28427
Trojan.Packed.28428
Trojan.Packed.28429
Trojan.Packed.28432
Trojan.Packed.28434
Trojan.Packed.28436
Trojan.Packed.28437
Trojan.Packed.28440
Trojan.Packed.28442
Trojan.Packed.28443
Trojan.Packed.28446
Trojan.Packed.28448
Trojan.Packed.28449
Trojan.Packed.28453
Trojan.Packed.28454
Trojan.Packed.28456
Trojan.Packed.28462
Trojan.Packed.28470
Trojan.Packed.28473
Trojan.Packed.28474
Trojan.Packed.28475
Trojan.Packed.28476
Trojan.Packed.28480
Trojan.Packed.28481
Trojan.Packed.28485
Trojan.Packed.28492
Trojan.Packed.28493
Trojan.Packed.28494
Trojan.Packed.28495
Trojan.Packed.28496
Trojan.Packed.28497
Trojan.Packed.28499
Trojan.Packed.28500
Trojan.Packed.28503
Trojan.Packed.28512
Trojan.Packed.28517
Trojan.Packed.28519
Trojan.Packed.28520
Trojan.Packed.28521
Trojan.Packed.28522
Trojan.Packed.28523
Trojan.Packed.28524
Trojan.Packed.28530
Trojan.Packed.28531
Trojan.Packed.28532
Trojan.Packed.28533
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.