The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
Android.BackDoor – family of Trojans that target mobile devices under Android OS and are capable of executing commands from cybercriminals. Depending on the modification, the Trojans can send text messages, open certain URLs in the installed web browser, gather information on the infected device, provide cybercriminals with phone book information, download other applications, and perform other malicious actions.
Android.BackDoor.1508
Android.BackDoor.1545
Android.Backdoor.1496
Android.Backdoor.1497
Android.Backdoor.1498
Android.Backdoor.1499
Android.Backdoor.1500
Android.Backdoor.1501
Android.Backdoor.1502
Android.Backdoor.1503
Android.Backdoor.1504
Android.Backdoor.1505
Android.Backdoor.1506
Android.Backdoor.1507
Android.Backdoor.1509
Android.Backdoor.1510
Android.Backdoor.1511
Android.Backdoor.1512
Android.Backdoor.1513
Android.Backdoor.1515
Android.Backdoor.1516
Android.Backdoor.1517
Android.Backdoor.1518
Android.Backdoor.1519
Android.Backdoor.1520
Android.Backdoor.1521
Android.Backdoor.1523
Android.Backdoor.1524
Android.Backdoor.1525
Android.Backdoor.1526
Android.Backdoor.1527
Android.Backdoor.1528
Android.Backdoor.1529
Android.Backdoor.1531
Android.Backdoor.1532
Android.Backdoor.1534
Android.Backdoor.1535
Android.Backdoor.1536
Android.Backdoor.1537
Android.Backdoor.1538
Android.Backdoor.1539
Android.Backdoor.1540
Android.Backdoor.1541
Android.Backdoor.1542
Android.Backdoor.1543
Android.Backdoor.1546
Android.Backdoor.1547
Android.Backdoor.1548
Android.Backdoor.1549
Android.Backdoor.1550
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.
© Doctor Web
2003 — 2022
Doctor Web to rosyjski producent oprogramowania antywirusowego Dr.Web. Rozwijamy nasze produkty od 1992 roku.