The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
Name | Vendor | Dr.Web classification name |
---|---|---|
Suspect-1B!B62D579EC9FE | McAfee | Trojan.Packed |
Packed.Win32.Katusha.a | Kaspersky | Trojan.Packed |
Trojan.CryptRedol.Gen.5 | BitDefender | Trojan.Packed |
Trojan.Packed | SunBelt | Trojan.Packed.12396 |
Trojan.Packed | SunBelt | Trojan.Packed.142 |
Trojan.Packed | SunBelt | Trojan.Packed.18745 |
Trojan.Packed.22680
Trojan.Packed.22683
Trojan.Packed.22684
Trojan.Packed.22685
Trojan.Packed.22686
Trojan.Packed.22687
Trojan.Packed.22688
Trojan.Packed.22689
Trojan.Packed.22690
Trojan.Packed.22701
Trojan.Packed.22702
Trojan.Packed.22711
Trojan.Packed.22713
Trojan.Packed.22719
Trojan.Packed.22720
Trojan.Packed.22722
Trojan.Packed.22723
Trojan.Packed.22724
Trojan.Packed.22726
Trojan.Packed.22728
Trojan.Packed.22729
Trojan.Packed.22730
Trojan.Packed.22731
Trojan.Packed.22732
Trojan.Packed.22734
Trojan.Packed.22736
Trojan.Packed.22744
Trojan.Packed.22753
Trojan.Packed.22754
Trojan.Packed.22757
Trojan.Packed.22797
Trojan.Packed.22805
Trojan.Packed.22806
Trojan.Packed.22807
Trojan.Packed.22810
Trojan.Packed.22820
Trojan.Packed.22825
Trojan.Packed.22826
Trojan.Packed.22828
Trojan.Packed.22829
Trojan.Packed.22831
Trojan.Packed.22833
Trojan.Packed.22836
Trojan.Packed.22840
Trojan.Packed.22841
Trojan.Packed.22843
Trojan.Packed.22849
Trojan.Packed.22856
Trojan.Packed.22862
Trojan.Packed.22868
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.