The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
Name | Vendor | Dr.Web classification name |
---|---|---|
Suspect-1B!B62D579EC9FE | McAfee | Trojan.Packed |
Packed.Win32.Katusha.a | Kaspersky | Trojan.Packed |
Trojan.CryptRedol.Gen.5 | BitDefender | Trojan.Packed |
Trojan.Packed | SunBelt | Trojan.Packed.12396 |
Trojan.Packed | SunBelt | Trojan.Packed.142 |
Trojan.Packed | SunBelt | Trojan.Packed.18745 |
Trojan.Packed.28813
Trojan.Packed.28814
Trojan.Packed.28815
Trojan.Packed.28816
Trojan.Packed.28817
Trojan.Packed.28818
Trojan.Packed.28819
Trojan.Packed.28820
Trojan.Packed.28821
Trojan.Packed.28822
Trojan.Packed.28823
Trojan.Packed.28824
Trojan.Packed.28825
Trojan.Packed.28826
Trojan.Packed.28827
Trojan.Packed.28828
Trojan.Packed.28829
Trojan.Packed.2883
Trojan.Packed.28830
Trojan.Packed.28831
Trojan.Packed.28832
Trojan.Packed.28833
Trojan.Packed.28834
Trojan.Packed.28835
Trojan.Packed.28836
Trojan.Packed.28837
Trojan.Packed.28838
Trojan.Packed.28839
Trojan.Packed.28840
Trojan.Packed.28841
Trojan.Packed.28842
Trojan.Packed.28843
Trojan.Packed.28844
Trojan.Packed.28845
Trojan.Packed.28846
Trojan.Packed.28847
Trojan.Packed.28848
Trojan.Packed.28849
Trojan.Packed.28850
Trojan.Packed.28851
Trojan.Packed.28852
Trojan.Packed.28853
Trojan.Packed.28854
Trojan.Packed.28855
Trojan.Packed.28856
Trojan.Packed.28857
Trojan.Packed.28858
Trojan.Packed.28859
Trojan.Packed.28860
Trojan.Packed.28861
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.