The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
Trojan.Tofsee.2067
Trojan.Tofsee.2069
Trojan.Tofsee.207
Trojan.Tofsee.2070
Trojan.Tofsee.2071
Trojan.Tofsee.2072
Trojan.Tofsee.2073
Trojan.Tofsee.2074
Trojan.Tofsee.2075
Trojan.Tofsee.2076
Trojan.Tofsee.2077
Trojan.Tofsee.2078
Trojan.Tofsee.2079
Trojan.Tofsee.208
Trojan.Tofsee.2080
Trojan.Tofsee.2081
Trojan.Tofsee.2082
Trojan.Tofsee.2083
Trojan.Tofsee.2084
Trojan.Tofsee.2085
Trojan.Tofsee.2086
Trojan.Tofsee.2087
Trojan.Tofsee.2090
Trojan.Tofsee.2091
Trojan.Tofsee.2092
Trojan.Tofsee.2093
Trojan.Tofsee.2094
Trojan.Tofsee.2096
Trojan.Tofsee.2097
Trojan.Tofsee.2098
Trojan.Tofsee.2099
Trojan.Tofsee.2100
Trojan.Tofsee.2101
Trojan.Tofsee.2102
Trojan.Tofsee.2103
Trojan.Tofsee.2104
Trojan.Tofsee.2105
Trojan.Tofsee.2106
Trojan.Tofsee.2107
Trojan.Tofsee.2108
Trojan.Tofsee.2109
Trojan.Tofsee.2110
Trojan.Tofsee.2111
Trojan.Tofsee.2112
Trojan.Tofsee.2113
Trojan.Tofsee.2114
Trojan.Tofsee.2115
Trojan.Tofsee.2117
Trojan.Tofsee.2118
Trojan.Tofsee.2119
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.