Library
My library

+ Add to library

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Android.Backdoor in virus library:

Android.BackDoor – family of Trojans that target mobile devices under Android OS and are capable of executing commands from cybercriminals. Depending on the modification, the Trojans can send text messages, open certain URLs in the installed web browser, gather information on the infected device, provide cybercriminals with phone book information, download other applications, and perform other malicious actions.

Android.Backdoor in virus library:

Android.Backdoor.1840
Android.Backdoor.1844
Android.Backdoor.1845
Android.Backdoor.1847
Android.Backdoor.1848
Android.Backdoor.1849
Android.Backdoor.1850
Android.Backdoor.1851
Android.Backdoor.1852
Android.Backdoor.1856
Android.Backdoor.1857
Android.Backdoor.1858
Android.Backdoor.1859
Android.Backdoor.1860
Android.Backdoor.1861
Android.Backdoor.1862
Android.Backdoor.1863
Android.Backdoor.1864
Android.Backdoor.1865
Android.Backdoor.1866
Android.Backdoor.1867
Android.Backdoor.1868
Android.Backdoor.1870
Android.Backdoor.1871
Android.Backdoor.1872
Android.Backdoor.1873
Android.Backdoor.1874
Android.Backdoor.1875
Android.Backdoor.1878
Android.Backdoor.1879
Android.Backdoor.1881
Android.Backdoor.1882
Android.Backdoor.1883
Android.Backdoor.1884
Android.Backdoor.1885
Android.Backdoor.1886
Android.Backdoor.1887
Android.Backdoor.1888
Android.Backdoor.1889
Android.Backdoor.1890
Android.Backdoor.1891
Android.Backdoor.1892
Android.Backdoor.1893
Android.Backdoor.1894
Android.Backdoor.1895
Android.Backdoor.1897
Android.Backdoor.1898
Android.Backdoor.1901
Android.Backdoor.1902
Android.Backdoor.1903

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.