Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Trojan.Tofsee in virus library:

Trojan.Tofsee.2469
Trojan.Tofsee.247
Trojan.Tofsee.2470
Trojan.Tofsee.2471
Trojan.Tofsee.2472
Trojan.Tofsee.2473
Trojan.Tofsee.2475
Trojan.Tofsee.2476
Trojan.Tofsee.2477
Trojan.Tofsee.2478
Trojan.Tofsee.2479
Trojan.Tofsee.248
Trojan.Tofsee.2480
Trojan.Tofsee.2481
Trojan.Tofsee.2482
Trojan.Tofsee.2483
Trojan.Tofsee.2484
Trojan.Tofsee.2485
Trojan.Tofsee.2486
Trojan.Tofsee.2487
Trojan.Tofsee.2488
Trojan.Tofsee.2489
Trojan.Tofsee.249
Trojan.Tofsee.2490
Trojan.Tofsee.2491
Trojan.Tofsee.2492
Trojan.Tofsee.2493
Trojan.Tofsee.2494
Trojan.Tofsee.2495
Trojan.Tofsee.2496
Trojan.Tofsee.2497
Trojan.Tofsee.2498
Trojan.Tofsee.2499
Trojan.Tofsee.2500
Trojan.Tofsee.2501
Trojan.Tofsee.2502
Trojan.Tofsee.2503
Trojan.Tofsee.2504
Trojan.Tofsee.2505
Trojan.Tofsee.2506
Trojan.Tofsee.2507
Trojan.Tofsee.2508
Trojan.Tofsee.2509
Trojan.Tofsee.251
Trojan.Tofsee.2510
Trojan.Tofsee.2511
Trojan.Tofsee.2512
Trojan.Tofsee.2513
Trojan.Tofsee.2514
Trojan.Tofsee.2515

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.