The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
Trojan.Starman.5951
Trojan.Starman.5952
Trojan.Starman.5953
Trojan.Starman.5954
Trojan.Starman.5955
Trojan.Starman.5956
Trojan.Starman.5957
Trojan.Starman.5958
Trojan.Starman.5959
Trojan.Starman.5960
Trojan.Starman.5961
Trojan.Starman.5962
Trojan.Starman.5963
Trojan.Starman.5964
Trojan.Starman.5965
Trojan.Starman.5966
Trojan.Starman.5967
Trojan.Starman.5968
Trojan.Starman.5969
Trojan.Starman.5970
Trojan.Starman.5971
Trojan.Starman.5972
Trojan.Starman.5973
Trojan.Starman.5974
Trojan.Starman.5975
Trojan.Starman.5976
Trojan.Starman.5977
Trojan.Starman.5978
Trojan.Starman.5979
Trojan.Starman.5980
Trojan.Starman.5981
Trojan.Starman.5982
Trojan.Starman.5983
Trojan.Starman.5984
Trojan.Starman.5985
Trojan.Starman.5986
Trojan.Starman.5987
Trojan.Starman.5988
Trojan.Starman.5989
Trojan.Starman.5990
Trojan.Starman.5991
Trojan.Starman.5992
Trojan.Starman.5993
Trojan.Starman.5994
Trojan.Starman.5995
Trojan.Starman.5996
Trojan.Starman.5997
Trojan.Starman.5998
Trojan.Starman.5999
Trojan.Starman.6000
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.