The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
Trojan.Starman.6352
Trojan.Starman.6353
Trojan.Starman.6354
Trojan.Starman.6355
Trojan.Starman.6356
Trojan.Starman.6357
Trojan.Starman.6358
Trojan.Starman.6359
Trojan.Starman.6360
Trojan.Starman.6361
Trojan.Starman.6362
Trojan.Starman.6363
Trojan.Starman.6364
Trojan.Starman.6365
Trojan.Starman.6366
Trojan.Starman.6367
Trojan.Starman.6368
Trojan.Starman.6369
Trojan.Starman.6370
Trojan.Starman.6371
Trojan.Starman.6372
Trojan.Starman.6373
Trojan.Starman.6374
Trojan.Starman.6375
Trojan.Starman.6376
Trojan.Starman.6377
Trojan.Starman.6378
Trojan.Starman.6379
Trojan.Starman.6380
Trojan.Starman.6381
Trojan.Starman.6382
Trojan.Starman.6383
Trojan.Starman.6384
Trojan.Starman.6385
Trojan.Starman.6386
Trojan.Starman.6387
Trojan.Starman.6388
Trojan.Starman.6389
Trojan.Starman.6390
Trojan.Starman.6391
Trojan.Starman.6392
Trojan.Starman.6393
Trojan.Starman.6394
Trojan.Starman.6395
Trojan.Starman.6396
Trojan.Starman.6397
Trojan.Starman.6398
Trojan.Starman.6399
Trojan.Starman.6400
Trojan.Starman.6401
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.