Library
My library

+ Add to library

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Android.Backdoor in virus library:

Android.BackDoor – family of Trojans that target mobile devices under Android OS and are capable of executing commands from cybercriminals. Depending on the modification, the Trojans can send text messages, open certain URLs in the installed web browser, gather information on the infected device, provide cybercriminals with phone book information, download other applications, and perform other malicious actions.

Android.Backdoor in virus library:

Android.Backdoor.1107
Android.Backdoor.1108
Android.Backdoor.1109
Android.Backdoor.1110
Android.Backdoor.1111
Android.Backdoor.1112
Android.Backdoor.1113
Android.Backdoor.1114
Android.Backdoor.1115
Android.Backdoor.1116
Android.Backdoor.1117
Android.Backdoor.1118
Android.Backdoor.1119
Android.Backdoor.1120
Android.Backdoor.1121
Android.Backdoor.1122
Android.Backdoor.1123
Android.Backdoor.1125
Android.Backdoor.1126
Android.Backdoor.1127
Android.Backdoor.1128
Android.Backdoor.1129
Android.Backdoor.1130
Android.Backdoor.1131
Android.Backdoor.1132
Android.Backdoor.1133
Android.Backdoor.1134
Android.Backdoor.1135
Android.Backdoor.114.origin
Android.Backdoor.1140
Android.Backdoor.1141
Android.Backdoor.1142
Android.Backdoor.1143
Android.Backdoor.1144
Android.Backdoor.1145
Android.Backdoor.1146
Android.Backdoor.1147
Android.Backdoor.1148
Android.Backdoor.1149
Android.Backdoor.1150
Android.Backdoor.1151
Android.Backdoor.1152
Android.Backdoor.1154
Android.Backdoor.1155
Android.Backdoor.1156
Android.Backdoor.1157
Android.Backdoor.1158
Android.Backdoor.1159
Android.Backdoor.1160
Android.Backdoor.1163

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.