The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
Trojan.Tofsee
Trojan.Tofsee.100
Trojan.Tofsee.1018
Trojan.Tofsee.1055
Trojan.Tofsee.110
Trojan.Tofsee.111
Trojan.Tofsee.112
Trojan.Tofsee.1128
Trojan.Tofsee.116
Trojan.Tofsee.118
Trojan.Tofsee.123
Trojan.Tofsee.124
Trojan.Tofsee.125
Trojan.Tofsee.126
Trojan.Tofsee.1260
Trojan.Tofsee.127
Trojan.Tofsee.1287
Trojan.Tofsee.129
Trojan.Tofsee.130
Trojan.Tofsee.131
Trojan.Tofsee.1311
Trojan.Tofsee.1312
Trojan.Tofsee.1313
Trojan.Tofsee.1314
Trojan.Tofsee.1315
Trojan.Tofsee.1316
Trojan.Tofsee.1317
Trojan.Tofsee.1318
Trojan.Tofsee.1319
Trojan.Tofsee.1320
Trojan.Tofsee.1321
Trojan.Tofsee.1322
Trojan.Tofsee.1323
Trojan.Tofsee.1324
Trojan.Tofsee.1325
Trojan.Tofsee.1326
Trojan.Tofsee.1327
Trojan.Tofsee.1328
Trojan.Tofsee.1329
Trojan.Tofsee.1330
Trojan.Tofsee.1331
Trojan.Tofsee.1332
Trojan.Tofsee.1335
Trojan.Tofsee.1336
Trojan.Tofsee.1337
Trojan.Tofsee.1338
Trojan.Tofsee.1339
Trojan.Tofsee.1340
Trojan.Tofsee.1341
Trojan.Tofsee.1342
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.