The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
Trojan.Starman.5748
Trojan.Starman.5749
Trojan.Starman.5750
Trojan.Starman.5751
Trojan.Starman.5752
Trojan.Starman.5753
Trojan.Starman.5754
Trojan.Starman.5755
Trojan.Starman.5756
Trojan.Starman.5757
Trojan.Starman.5758
Trojan.Starman.5759
Trojan.Starman.5760
Trojan.Starman.5761
Trojan.Starman.5762
Trojan.Starman.5763
Trojan.Starman.5764
Trojan.Starman.5765
Trojan.Starman.5766
Trojan.Starman.5767
Trojan.Starman.5768
Trojan.Starman.5769
Trojan.Starman.5770
Trojan.Starman.5771
Trojan.Starman.5772
Trojan.Starman.5773
Trojan.Starman.5775
Trojan.Starman.5776
Trojan.Starman.5777
Trojan.Starman.5778
Trojan.Starman.5779
Trojan.Starman.5780
Trojan.Starman.5781
Trojan.Starman.5782
Trojan.Starman.5783
Trojan.Starman.5784
Trojan.Starman.5785
Trojan.Starman.5786
Trojan.Starman.5787
Trojan.Starman.5788
Trojan.Starman.5789
Trojan.Starman.5790
Trojan.Starman.5791
Trojan.Starman.5792
Trojan.Starman.5793
Trojan.Starman.5794
Trojan.Starman.5795
Trojan.Starman.5796
Trojan.Starman.5797
Trojan.Starman.5798
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.