The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
Trojan.Tofsee.5735
Trojan.Tofsee.5736
Trojan.Tofsee.5737
Trojan.Tofsee.5738
Trojan.Tofsee.5739
Trojan.Tofsee.5740
Trojan.Tofsee.5741
Trojan.Tofsee.5742
Trojan.Tofsee.5743
Trojan.Tofsee.5744
Trojan.Tofsee.5745
Trojan.Tofsee.5746
Trojan.Tofsee.5747
Trojan.Tofsee.5748
Trojan.Tofsee.5749
Trojan.Tofsee.5750
Trojan.Tofsee.5751
Trojan.Tofsee.5752
Trojan.Tofsee.5753
Trojan.Tofsee.5754
Trojan.Tofsee.5755
Trojan.Tofsee.5756
Trojan.Tofsee.5757
Trojan.Tofsee.5758
Trojan.Tofsee.5759
Trojan.Tofsee.5760
Trojan.Tofsee.5761
Trojan.Tofsee.5762
Trojan.Tofsee.5763
Trojan.Tofsee.5764
Trojan.Tofsee.5765
Trojan.Tofsee.5766
Trojan.Tofsee.5767
Trojan.Tofsee.5768
Trojan.Tofsee.5769
Trojan.Tofsee.5770
Trojan.Tofsee.5771
Trojan.Tofsee.5772
Trojan.Tofsee.5773
Trojan.Tofsee.5774
Trojan.Tofsee.5775
Trojan.Tofsee.5776
Trojan.Tofsee.5777
Trojan.Tofsee.5778
Trojan.Tofsee.5779
Trojan.Tofsee.5780
Trojan.Tofsee.5781
Trojan.Tofsee.5782
Trojan.Tofsee.5783
Trojan.Tofsee.5784
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.