The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
Trojan.Tofsee.6001
Trojan.Tofsee.6002
Trojan.Tofsee.6003
Trojan.Tofsee.6004
Trojan.Tofsee.6005
Trojan.Tofsee.6006
Trojan.Tofsee.6007
Trojan.Tofsee.6008
Trojan.Tofsee.6009
Trojan.Tofsee.601
Trojan.Tofsee.6010
Trojan.Tofsee.6011
Trojan.Tofsee.6014
Trojan.Tofsee.6015
Trojan.Tofsee.6016
Trojan.Tofsee.6017
Trojan.Tofsee.6019
Trojan.Tofsee.6021
Trojan.Tofsee.6022
Trojan.Tofsee.6023
Trojan.Tofsee.6024
Trojan.Tofsee.6025
Trojan.Tofsee.6027
Trojan.Tofsee.6028
Trojan.Tofsee.6029
Trojan.Tofsee.603
Trojan.Tofsee.6030
Trojan.Tofsee.6031
Trojan.Tofsee.6032
Trojan.Tofsee.6033
Trojan.Tofsee.6034
Trojan.Tofsee.6035
Trojan.Tofsee.6036
Trojan.Tofsee.6038
Trojan.Tofsee.6039
Trojan.Tofsee.6040
Trojan.Tofsee.6041
Trojan.Tofsee.6042
Trojan.Tofsee.6045
Trojan.Tofsee.6046
Trojan.Tofsee.6053
Trojan.Tofsee.6056
Trojan.Tofsee.6058
Trojan.Tofsee.6059
Trojan.Tofsee.6060
Trojan.Tofsee.6061
Trojan.Tofsee.6063
Trojan.Tofsee.6064
Trojan.Tofsee.6066
Trojan.Tofsee.6069
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.