The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
Trojan.Starman.5296
Trojan.Starman.5297
Trojan.Starman.5298
Trojan.Starman.5299
Trojan.Starman.5300
Trojan.Starman.5301
Trojan.Starman.5302
Trojan.Starman.5303
Trojan.Starman.5304
Trojan.Starman.5305
Trojan.Starman.5306
Trojan.Starman.5307
Trojan.Starman.5308
Trojan.Starman.5309
Trojan.Starman.5310
Trojan.Starman.5311
Trojan.Starman.5312
Trojan.Starman.5313
Trojan.Starman.5314
Trojan.Starman.5315
Trojan.Starman.5316
Trojan.Starman.5317
Trojan.Starman.5318
Trojan.Starman.5319
Trojan.Starman.5320
Trojan.Starman.5321
Trojan.Starman.5322
Trojan.Starman.5323
Trojan.Starman.5324
Trojan.Starman.5325
Trojan.Starman.5326
Trojan.Starman.5327
Trojan.Starman.5328
Trojan.Starman.5329
Trojan.Starman.5330
Trojan.Starman.5331
Trojan.Starman.5332
Trojan.Starman.5333
Trojan.Starman.5334
Trojan.Starman.5335
Trojan.Starman.5336
Trojan.Starman.5337
Trojan.Starman.5338
Trojan.Starman.5339
Trojan.Starman.5340
Trojan.Starman.5341
Trojan.Starman.5342
Trojan.Starman.5343
Trojan.Starman.5344
Trojan.Starman.5345
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.