Library
My library

+ Add to library

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Android.Backdoor in virus library:

Android.BackDoor – family of Trojans that target mobile devices under Android OS and are capable of executing commands from cybercriminals. Depending on the modification, the Trojans can send text messages, open certain URLs in the installed web browser, gather information on the infected device, provide cybercriminals with phone book information, download other applications, and perform other malicious actions.

Android.Backdoor in virus library:

Android.Backdoor.1721
Android.Backdoor.1722
Android.Backdoor.1724
Android.Backdoor.1725
Android.Backdoor.1726
Android.Backdoor.1727
Android.Backdoor.1728
Android.Backdoor.1729
Android.Backdoor.1730
Android.Backdoor.1731
Android.Backdoor.1732
Android.Backdoor.1733
Android.Backdoor.1734
Android.Backdoor.1735
Android.Backdoor.1736
Android.Backdoor.1737
Android.Backdoor.1738
Android.Backdoor.1739
Android.Backdoor.1740
Android.Backdoor.1741
Android.Backdoor.1742
Android.Backdoor.1743
Android.Backdoor.1744
Android.Backdoor.1745
Android.Backdoor.1746
Android.Backdoor.1747
Android.Backdoor.1751
Android.Backdoor.1752
Android.Backdoor.1753
Android.Backdoor.1754
Android.Backdoor.1755
Android.Backdoor.1756
Android.Backdoor.1757
Android.Backdoor.1758
Android.Backdoor.1759
Android.Backdoor.176.origin
Android.Backdoor.1760
Android.Backdoor.1761
Android.Backdoor.1762
Android.Backdoor.1763
Android.Backdoor.1764
Android.Backdoor.1765
Android.Backdoor.1766
Android.Backdoor.1767
Android.Backdoor.1768
Android.Backdoor.1769
Android.Backdoor.1770
Android.Backdoor.1771
Android.Backdoor.1772
Android.Backdoor.1773

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.