Ma bibliothèque

+ Ajouter à la bibliothèque

Contacter-nous !
Support 24/24 | Rules regarding submitting

Nous téléphoner

0 825 300 230


Vos requêtes

  • Toutes : -
  • Non clôturées : -
  • Dernière : le -

Nous téléphoner

0 825 300 230


Bibliothèque de virus

L’analyse des technologies utilisées par les pirates nous permet de déterminer les axes potentiels d’évolution de l’industrie cybercriminelle et de résister aux futures menaces de manière plus efficace. Vous pouvez également en savoir plus sur le comportement des programmes malveillants dans les systèmes contaminés et sur les méthodes permettant de contrer les menaces.

Program.FakeMoney in virus library:

Program.FakeMoney virus records are used to detect fraudulent applications that are positioned as online money-generating instruments. Users of such software do not actually receive the payments promised to them and risk having their personal data exposed by filling in special money withdrawal forms.

Most often potential victims are offered the opportunity to perform various tasks. This includes watching video clips and advertisements, writing reviews on certain sites and for certain services, and installing games and apps, to name a few. After successfully completing tasks, users receive a reward, which typically comes in the form of virtual currency. In theory, this reward can be converted into real money or exchanged for valuable consumer goods. In practice, however, when dealing with such apps, users risk encountering numerous problems.

First, these apps may initially set a high minimum number of rewards that must be collected in order to initiate the withdrawal process. With that, the reward for completing tasks is, on the contrary, set low to impede the user from collecting the necessary amount too soon. This effectively will delay the “payments” for as long as possible. As a result, users will waste significantly more resources—like time, internet traffic, and electricity—on completing tasks in comparison with the income they expect.

Second, the money withdrawal process itself can be artificially made complicated or absent altogether. For instance, users may be told that their request is in a queue, that the payment system or bank involved requires more time to process the request, or that there was an unexpected error.

Third, the tasks offered can pose a potential threat. For example, malicious actors can disguise trojan applications as harmless games that must be installed for a reward. And the ads displayed may propose illegal items and goods or fraudulent websites.

Les vulnérabilités de l’OS Android.

Selon les statistiques, un programme sur cinq créé pour Android comporte une vulnérabilité (ou autrement dit, un " trou "), ce qui permet aux pirates de contaminer les appareils.

Le Contrôleur de sécurité au sein de Dr.Web pour Android analyse le système afin de détecter les problèmes de sécurité et propose des solutions pour y remédier.