The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
Trojan.Tofsee.3727
Trojan.Tofsee.3728
Trojan.Tofsee.3729
Trojan.Tofsee.3730
Trojan.Tofsee.3731
Trojan.Tofsee.3732
Trojan.Tofsee.3733
Trojan.Tofsee.3734
Trojan.Tofsee.3735
Trojan.Tofsee.3736
Trojan.Tofsee.3737
Trojan.Tofsee.3738
Trojan.Tofsee.3739
Trojan.Tofsee.3740
Trojan.Tofsee.3741
Trojan.Tofsee.3742
Trojan.Tofsee.3743
Trojan.Tofsee.3744
Trojan.Tofsee.3745
Trojan.Tofsee.3746
Trojan.Tofsee.3747
Trojan.Tofsee.3748
Trojan.Tofsee.3749
Trojan.Tofsee.3750
Trojan.Tofsee.3751
Trojan.Tofsee.3752
Trojan.Tofsee.3753
Trojan.Tofsee.3754
Trojan.Tofsee.3755
Trojan.Tofsee.3756
Trojan.Tofsee.3757
Trojan.Tofsee.3758
Trojan.Tofsee.3759
Trojan.Tofsee.3760
Trojan.Tofsee.3761
Trojan.Tofsee.3762
Trojan.Tofsee.3763
Trojan.Tofsee.3764
Trojan.Tofsee.3766
Trojan.Tofsee.3767
Trojan.Tofsee.3768
Trojan.Tofsee.3769
Trojan.Tofsee.3770
Trojan.Tofsee.3771
Trojan.Tofsee.3772
Trojan.Tofsee.3773
Trojan.Tofsee.3774
Trojan.Tofsee.3775
Trojan.Tofsee.3776
Trojan.Tofsee.3777
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.