Library
My library

+ Add to library

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Android.Backdoor in virus library:

Android.BackDoor – family of Trojans that target mobile devices under Android OS and are capable of executing commands from cybercriminals. Depending on the modification, the Trojans can send text messages, open certain URLs in the installed web browser, gather information on the infected device, provide cybercriminals with phone book information, download other applications, and perform other malicious actions.

Android.Backdoor in virus library:

Android.BackDoor.480
Android.BackDoor.494
Android.BackDoor.496
Android.BackDoor.507
Android.BackDoor.511
Android.Backdoor.477
Android.Backdoor.478
Android.Backdoor.479
Android.Backdoor.481
Android.Backdoor.482
Android.Backdoor.483
Android.Backdoor.484
Android.Backdoor.485
Android.Backdoor.486
Android.Backdoor.487
Android.Backdoor.488
Android.Backdoor.489
Android.Backdoor.490
Android.Backdoor.491
Android.Backdoor.492
Android.Backdoor.493
Android.Backdoor.495
Android.Backdoor.497
Android.Backdoor.498
Android.Backdoor.499
Android.Backdoor.500
Android.Backdoor.501
Android.Backdoor.502
Android.Backdoor.503
Android.Backdoor.504
Android.Backdoor.505
Android.Backdoor.506
Android.Backdoor.508
Android.Backdoor.509
Android.Backdoor.510
Android.Backdoor.512
Android.Backdoor.513
Android.Backdoor.514
Android.Backdoor.515
Android.Backdoor.516
Android.Backdoor.517
Android.Backdoor.518
Android.Backdoor.519
Android.Backdoor.520
Android.Backdoor.521
Android.Backdoor.522
Android.Backdoor.523
Android.Backdoor.524
Android.Backdoor.526
Android.Backdoor.527

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.