The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
Trojan.Fraudster
Trojan.Fraudster.1042
Trojan.Fraudster.1044
Trojan.Fraudster.1091
Trojan.Fraudster.1104
Trojan.Fraudster.1108
Trojan.Fraudster.1119
Trojan.Fraudster.1122
Trojan.Fraudster.1147
Trojan.Fraudster.1164
Trojan.Fraudster.1165
Trojan.Fraudster.1171
Trojan.Fraudster.1178
Trojan.Fraudster.1179
Trojan.Fraudster.1185
Trojan.Fraudster.1187
Trojan.Fraudster.1188
Trojan.Fraudster.1190
Trojan.Fraudster.1191
Trojan.Fraudster.1194
Trojan.Fraudster.1195
Trojan.Fraudster.1197
Trojan.Fraudster.1200
Trojan.Fraudster.1207
Trojan.Fraudster.1209
Trojan.Fraudster.1210
Trojan.Fraudster.1211
Trojan.Fraudster.1212
Trojan.Fraudster.1213
Trojan.Fraudster.1215
Trojan.Fraudster.1217
Trojan.Fraudster.1218
Trojan.Fraudster.1219
Trojan.Fraudster.1221
Trojan.Fraudster.1223
Trojan.Fraudster.1226
Trojan.Fraudster.1228
Trojan.Fraudster.1229
Trojan.Fraudster.1230
Trojan.Fraudster.1231
Trojan.Fraudster.1232
Trojan.Fraudster.1237
Trojan.Fraudster.1240
Trojan.Fraudster.1242
Trojan.Fraudster.1244
Trojan.Fraudster.1245
Trojan.Fraudster.1247
Trojan.Fraudster.1251
Trojan.Fraudster.1253
Trojan.Fraudster.1254
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.