The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
Win32.HLLM.MyDoom.1182
Win32.HLLM.MyDoom.1183
Win32.HLLM.MyDoom.1184
Win32.HLLM.MyDoom.1186
Win32.HLLM.MyDoom.1187
Win32.HLLM.MyDoom.1188
Win32.HLLM.MyDoom.1195
Win32.HLLM.MyDoom.1196
Win32.HLLM.MyDoom.1210
Win32.HLLM.MyDoom.1216
Win32.HLLM.MyDoom.1225
Win32.HLLM.MyDoom.1226
Win32.HLLM.MyDoom.1227
Win32.HLLM.MyDoom.1228
Win32.HLLM.MyDoom.1232
Win32.HLLM.MyDoom.1233
Win32.HLLM.MyDoom.1235
Win32.HLLM.MyDoom.1236
Win32.HLLM.MyDoom.1237
Win32.HLLM.MyDoom.1238
Win32.HLLM.MyDoom.1239
Win32.HLLM.MyDoom.1241
Win32.HLLM.MyDoom.1243
Win32.HLLM.MyDoom.1249
Win32.HLLM.MyDoom.1252
Win32.HLLM.MyDoom.1254
Win32.HLLM.MyDoom.1255
Win32.HLLM.MyDoom.1256
Win32.HLLM.MyDoom.1258
Win32.HLLM.MyDoom.1266
Win32.HLLM.MyDoom.1269
Win32.HLLM.MyDoom.1270
Win32.HLLM.MyDoom.1300
Win32.HLLM.MyDoom.1302
Win32.HLLM.MyDoom.1303
Win32.HLLM.MyDoom.1313
Win32.HLLM.MyDoom.1315
Win32.HLLM.MyDoom.1317
Win32.HLLM.MyDoom.1329
Win32.HLLM.MyDoom.1332
Win32.HLLM.MyDoom.1336
Win32.HLLM.MyDoom.1342
Win32.HLLM.MyDoom.1369
Win32.HLLM.MyDoom.1390
Win32.HLLM.MyDoom.1394
Win32.HLLM.MyDoom.1422
Win32.HLLM.MyDoom.1423
Win32.HLLM.MyDoom.1432
Win32.HLLM.MyDoom.1581
Win32.HLLM.MyDoom.1614
1 2
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.