The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
Name | Vendor | Dr.Web classification name |
---|---|---|
Suspect-1B!B62D579EC9FE | McAfee | Trojan.Packed |
Packed.Win32.Katusha.a | Kaspersky | Trojan.Packed |
Trojan.CryptRedol.Gen.5 | BitDefender | Trojan.Packed |
Trojan.Packed | SunBelt | Trojan.Packed.12396 |
Trojan.Packed | SunBelt | Trojan.Packed.142 |
Trojan.Packed | SunBelt | Trojan.Packed.18745 |
Trojan.Packed.23164
Trojan.Packed.23165
Trojan.Packed.23168
Trojan.Packed.23180
Trojan.Packed.23183
Trojan.Packed.23186
Trojan.Packed.23188
Trojan.Packed.23193
Trojan.Packed.23195
Trojan.Packed.23198
Trojan.Packed.23200
Trojan.Packed.23201
Trojan.Packed.23204
Trojan.Packed.23205
Trojan.Packed.23222
Trojan.Packed.23228
Trojan.Packed.23229
Trojan.Packed.23233
Trojan.Packed.23251
Trojan.Packed.23253
Trojan.Packed.23254
Trojan.Packed.23260
Trojan.Packed.23265
Trojan.Packed.23267
Trojan.Packed.23268
Trojan.Packed.23284
Trojan.Packed.23291
Trojan.Packed.23295
Trojan.Packed.23297
Trojan.Packed.23300
Trojan.Packed.23306
Trojan.Packed.23316
Trojan.Packed.23322
Trojan.Packed.23323
Trojan.Packed.23324
Trojan.Packed.23325
Trojan.Packed.23326
Trojan.Packed.23334
Trojan.Packed.23335
Trojan.Packed.23340
Trojan.Packed.23342
Trojan.Packed.23343
Trojan.Packed.23345
Trojan.Packed.23347
Trojan.Packed.23352
Trojan.Packed.23355
Trojan.Packed.23357
Trojan.Packed.23361
Trojan.Packed.23363
Trojan.Packed.23364
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.