The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
Win32.HLLW.Texmer
Win32.HLLW.Texmer.1040
Win32.HLLW.Texmer.1079
Win32.HLLW.Texmer.1086
Win32.HLLW.Texmer.1152
Win32.HLLW.Texmer.1192
Win32.HLLW.Texmer.218
Win32.HLLW.Texmer.297
Win32.HLLW.Texmer.298
Win32.HLLW.Texmer.348
Win32.HLLW.Texmer.479
Win32.HLLW.Texmer.484
Win32.HLLW.Texmer.540
Win32.HLLW.Texmer.565
Win32.HLLW.Texmer.633
Win32.HLLW.Texmer.636
Win32.HLLW.Texmer.643
Win32.HLLW.Texmer.726
Win32.HLLW.Texmer.735
Win32.HLLW.Texmer.847
Win32.HLLW.Texmer.899
Win32.HLLW.Texmer.971
Win32.HLLW.Texmer.998
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.