The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
Adware.Plugin.100
Adware.Plugin.101
Adware.Plugin.102
Adware.Plugin.1020
Adware.Plugin.1081
Adware.Plugin.11
Adware.Plugin.111
Adware.Plugin.1206
Adware.Plugin.124
Adware.Plugin.13
Adware.Plugin.130
Adware.Plugin.134
Adware.Plugin.138
Adware.Plugin.1399
Adware.Plugin.14
Adware.Plugin.1416
Adware.Plugin.143
Adware.Plugin.146
Adware.Plugin.154
Adware.Plugin.155
Adware.Plugin.156
Adware.Plugin.160
Adware.Plugin.162
Adware.Plugin.163
Adware.Plugin.171
Adware.Plugin.1714
Adware.Plugin.18
Adware.Plugin.195
Adware.Plugin.21
Adware.Plugin.22
Adware.Plugin.222
Adware.Plugin.24
Adware.Plugin.253
Adware.Plugin.29
Adware.Plugin.31
Adware.Plugin.320
Adware.Plugin.327
Adware.Plugin.328
Adware.Plugin.345
Adware.Plugin.349
Adware.Plugin.35
Adware.Plugin.364
Adware.Plugin.437
Adware.Plugin.439
Adware.Plugin.47
Adware.Plugin.474
Adware.Plugin.475
Adware.Plugin.48
Adware.Plugin.483
Adware.Plugin.485
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.