The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
Trojan.SMSSend.2430
Trojan.SMSSend.2455
Trojan.SMSSend.2603
Trojan.SMSSend.2646
Trojan.SMSSend.2689
Trojan.SMSSend.2690
Trojan.SMSSend.270
Trojan.SMSSend.2739
Trojan.SMSSend.2754
Trojan.SMSSend.2768
Trojan.SMSSend.2838
Trojan.SMSSend.2857
Trojan.SMSSend.2882
Trojan.SMSSend.2920
Trojan.SMSSend.2937
Trojan.SMSSend.2939
Trojan.SMSSend.2952
Trojan.SMSSend.2956
Trojan.SMSSend.2958
Trojan.SMSSend.2969
Trojan.SMSSend.2991
Trojan.SMSSend.2992
Trojan.SMSSend.2993
Trojan.SMSSend.2995
Trojan.SMSSend.2997
Trojan.SMSSend.2998
Trojan.SMSSend.3001
Trojan.SMSSend.3004
Trojan.SMSSend.3005
Trojan.SMSSend.3024
Trojan.SMSSend.3032
Trojan.SMSSend.3063
Trojan.SMSSend.3097
Trojan.SMSSend.3111
Trojan.SMSSend.3167
Trojan.SMSSend.3178
Trojan.SMSSend.3179
Trojan.SMSSend.3184
Trojan.SMSSend.3188
Trojan.SMSSend.3201
Trojan.SMSSend.3203
Trojan.SMSSend.3210
Trojan.SMSSend.3225
Trojan.SMSSend.3226
Trojan.SMSSend.3231
Trojan.SMSSend.3243
Trojan.SMSSend.3256
Trojan.SMSSend.3260
Trojan.SMSSend.3262
Trojan.SMSSend.3271
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.