The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
Trojan.Starman.6301
Trojan.Starman.6302
Trojan.Starman.6303
Trojan.Starman.6304
Trojan.Starman.6305
Trojan.Starman.6306
Trojan.Starman.6307
Trojan.Starman.6308
Trojan.Starman.6309
Trojan.Starman.6310
Trojan.Starman.6311
Trojan.Starman.6312
Trojan.Starman.6313
Trojan.Starman.6314
Trojan.Starman.6315
Trojan.Starman.6317
Trojan.Starman.6318
Trojan.Starman.6319
Trojan.Starman.6320
Trojan.Starman.6321
Trojan.Starman.6322
Trojan.Starman.6323
Trojan.Starman.6324
Trojan.Starman.6325
Trojan.Starman.6326
Trojan.Starman.6327
Trojan.Starman.6328
Trojan.Starman.6329
Trojan.Starman.6330
Trojan.Starman.6331
Trojan.Starman.6332
Trojan.Starman.6333
Trojan.Starman.6334
Trojan.Starman.6335
Trojan.Starman.6336
Trojan.Starman.6337
Trojan.Starman.6338
Trojan.Starman.6339
Trojan.Starman.6340
Trojan.Starman.6341
Trojan.Starman.6342
Trojan.Starman.6343
Trojan.Starman.6344
Trojan.Starman.6345
Trojan.Starman.6346
Trojan.Starman.6347
Trojan.Starman.6348
Trojan.Starman.6349
Trojan.Starman.6350
Trojan.Starman.6351
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.