The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
Trojan.BPlug.1
Trojan.BPlug.10
Trojan.BPlug.1006
Trojan.BPlug.102
Trojan.BPlug.1029
Trojan.BPlug.104
Trojan.BPlug.1041
Trojan.BPlug.1045
Trojan.BPlug.1054
Trojan.BPlug.1057
Trojan.BPlug.107
Trojan.BPlug.1074
Trojan.BPlug.108
Trojan.BPlug.1088
Trojan.BPlug.109
Trojan.BPlug.11
Trojan.BPlug.110
Trojan.BPlug.113
Trojan.BPlug.116
Trojan.BPlug.12
Trojan.BPlug.121
Trojan.BPlug.135
Trojan.BPlug.137
Trojan.BPlug.138
Trojan.BPlug.139
Trojan.BPlug.140
Trojan.BPlug.145
Trojan.BPlug.15
Trojan.BPlug.1527
Trojan.BPlug.18
Trojan.BPlug.181
Trojan.BPlug.184
Trojan.BPlug.186
Trojan.BPlug.187
Trojan.BPlug.188
Trojan.BPlug.191
Trojan.BPlug.197
Trojan.BPlug.198
Trojan.BPlug.199
Trojan.BPlug.20
Trojan.BPlug.200
Trojan.BPlug.201
Trojan.BPlug.203
Trojan.BPlug.205
Trojan.BPlug.206
Trojan.BPlug.210
Trojan.BPlug.214
Trojan.BPlug.2162
Trojan.BPlug.22
Trojan.BPlug.226
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.