The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
Trojan.Tofsee.1343
Trojan.Tofsee.1344
Trojan.Tofsee.1345
Trojan.Tofsee.1346
Trojan.Tofsee.1347
Trojan.Tofsee.1348
Trojan.Tofsee.1349
Trojan.Tofsee.1350
Trojan.Tofsee.1351
Trojan.Tofsee.1352
Trojan.Tofsee.1355
Trojan.Tofsee.1358
Trojan.Tofsee.1359
Trojan.Tofsee.136
Trojan.Tofsee.1360
Trojan.Tofsee.1361
Trojan.Tofsee.1362
Trojan.Tofsee.1363
Trojan.Tofsee.1364
Trojan.Tofsee.1365
Trojan.Tofsee.1366
Trojan.Tofsee.1367
Trojan.Tofsee.1368
Trojan.Tofsee.1369
Trojan.Tofsee.1370
Trojan.Tofsee.1371
Trojan.Tofsee.1372
Trojan.Tofsee.1373
Trojan.Tofsee.1374
Trojan.Tofsee.1375
Trojan.Tofsee.1376
Trojan.Tofsee.1377
Trojan.Tofsee.1378
Trojan.Tofsee.1379
Trojan.Tofsee.138
Trojan.Tofsee.1380
Trojan.Tofsee.1382
Trojan.Tofsee.1383
Trojan.Tofsee.1384
Trojan.Tofsee.1385
Trojan.Tofsee.1391
Trojan.Tofsee.1392
Trojan.Tofsee.1393
Trojan.Tofsee.1394
Trojan.Tofsee.1396
Trojan.Tofsee.1397
Trojan.Tofsee.1399
Trojan.Tofsee.140
Trojan.Tofsee.1402
Trojan.Tofsee.1403
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.