The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
Trojan.Starman.4943
Trojan.Starman.4944
Trojan.Starman.4945
Trojan.Starman.4946
Trojan.Starman.4947
Trojan.Starman.4948
Trojan.Starman.4949
Trojan.Starman.4950
Trojan.Starman.4951
Trojan.Starman.4955
Trojan.Starman.4956
Trojan.Starman.4957
Trojan.Starman.4958
Trojan.Starman.4959
Trojan.Starman.4960
Trojan.Starman.4961
Trojan.Starman.4962
Trojan.Starman.4963
Trojan.Starman.4964
Trojan.Starman.4965
Trojan.Starman.4966
Trojan.Starman.4967
Trojan.Starman.4968
Trojan.Starman.4969
Trojan.Starman.4970
Trojan.Starman.4971
Trojan.Starman.4972
Trojan.Starman.4973
Trojan.Starman.4974
Trojan.Starman.4975
Trojan.Starman.4976
Trojan.Starman.4977
Trojan.Starman.4978
Trojan.Starman.4979
Trojan.Starman.4980
Trojan.Starman.4981
Trojan.Starman.4982
Trojan.Starman.4983
Trojan.Starman.4984
Trojan.Starman.4985
Trojan.Starman.4986
Trojan.Starman.4987
Trojan.Starman.4988
Trojan.Starman.4989
Trojan.Starman.4990
Trojan.Starman.4991
Trojan.Starman.4992
Trojan.Starman.4993
Trojan.Starman.4994
Trojan.Starman.4995
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.