The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
Programs belonging to this category are not malicious but at the same time not exactly useful either. Sometimes these programs can urge the user to purchase their full version (usually a useless one). Some of these programs can interrupt a stable running of the system.
In particular, to the Program.Unwanted category belong “cleaning” utilities or utilities for Windows registry optimization, numerous programs for “speeding up Internet connection”, “freeing up disk space”, “improving computer performance”, “updating drivers”, and other applications allegedly used to “speed up user’s computer” or to “scan” a computer for errors. In most cases, these programs “detect” non-existing problems urging the user to purchase a full version of the program to troubleshoot them. There have been some cases, when, due to errors in their code, such programs caused system failures, for example, BSOD (“Blue Screen of Death”).
Program.Unwanted.100
Program.Unwanted.102
Program.Unwanted.1085
Program.Unwanted.1087
Program.Unwanted.11
Program.Unwanted.1152
Program.Unwanted.1183
Program.Unwanted.121
Program.Unwanted.1244
Program.Unwanted.128
Program.Unwanted.1281
Program.Unwanted.129
Program.Unwanted.130
Program.Unwanted.132
Program.Unwanted.1336
Program.Unwanted.134
Program.Unwanted.135
Program.Unwanted.1350
Program.Unwanted.137
Program.Unwanted.14
Program.Unwanted.1511
Program.Unwanted.1746
Program.Unwanted.180
Program.Unwanted.2
Program.Unwanted.2096
Program.Unwanted.2097
Program.Unwanted.211
Program.Unwanted.213
Program.Unwanted.2136
Program.Unwanted.219
Program.Unwanted.24
Program.Unwanted.2404
Program.Unwanted.2457
Program.Unwanted.2482
Program.Unwanted.2484
Program.Unwanted.2488
Program.Unwanted.2520
Program.Unwanted.2606
Program.Unwanted.267
Program.Unwanted.276
Program.Unwanted.2818
Program.Unwanted.285
Program.Unwanted.2862
Program.Unwanted.287
Program.Unwanted.289
Program.Unwanted.29
Program.Unwanted.291
Program.Unwanted.293
Program.Unwanted.30
Program.Unwanted.304
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.