The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
Android.BackDoor – family of Trojans that target mobile devices under Android OS and are capable of executing commands from cybercriminals. Depending on the modification, the Trojans can send text messages, open certain URLs in the installed web browser, gather information on the infected device, provide cybercriminals with phone book information, download other applications, and perform other malicious actions.
Android.BackDoor.691
Android.BackDoor.697
Android.BackDoor.698
Android.BackDoor.701
Android.BackDoor.743
Android.Backdoor.689
Android.Backdoor.690
Android.Backdoor.692
Android.Backdoor.693
Android.Backdoor.694
Android.Backdoor.695
Android.Backdoor.696
Android.Backdoor.699
Android.Backdoor.700
Android.Backdoor.702
Android.Backdoor.703
Android.Backdoor.704
Android.Backdoor.705
Android.Backdoor.706
Android.Backdoor.707
Android.Backdoor.708
Android.Backdoor.709
Android.Backdoor.710
Android.Backdoor.711
Android.Backdoor.715
Android.Backdoor.716
Android.Backdoor.717
Android.Backdoor.719
Android.Backdoor.720
Android.Backdoor.721
Android.Backdoor.723
Android.Backdoor.724
Android.Backdoor.725
Android.Backdoor.726
Android.Backdoor.727
Android.Backdoor.729
Android.Backdoor.730
Android.Backdoor.731
Android.Backdoor.732
Android.Backdoor.733
Android.Backdoor.734
Android.Backdoor.735
Android.Backdoor.735.origin
Android.Backdoor.736
Android.Backdoor.736.origin
Android.Backdoor.737
Android.Backdoor.738
Android.Backdoor.740
Android.Backdoor.741
Android.Backdoor.742
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.