The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
Trojans for Android devices designed to install and delete software. Some of their modifications can gain root access to the infected device—thus, they are able to install and delete applications without user knowledge. In addition, Trojans of this family display annoying advertisements and send confidential information to the C&C server.
Android.Xiny.969
Android.Xiny.970
Android.Xiny.971
Android.Xiny.972
Android.Xiny.973
Android.Xiny.974
Android.Xiny.975
Android.Xiny.976
Android.Xiny.977
Android.Xiny.978
Android.Xiny.979
Android.Xiny.980
Android.Xiny.981
Android.Xiny.982
Android.Xiny.983
Android.Xiny.984
Android.Xiny.985
Android.Xiny.991
Android.Xiny.992
Android.Xiny.993
Android.Xiny.994
Android.Xiny.995
Android.Xiny.996
Android.Xiny.997
Android.Xiny.998
Android.Xiny.999
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.