Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Trojan.InstallCube in virus library:

Trojan.InstallCube.1
Trojan.InstallCube.101
Trojan.InstallCube.1016
Trojan.InstallCube.102
Trojan.InstallCube.1025
Trojan.InstallCube.103
Trojan.InstallCube.105
Trojan.InstallCube.106
Trojan.InstallCube.107
Trojan.InstallCube.108
Trojan.InstallCube.109
Trojan.InstallCube.1093
Trojan.InstallCube.110
Trojan.InstallCube.112
Trojan.InstallCube.113
Trojan.InstallCube.114
Trojan.InstallCube.115
Trojan.InstallCube.116
Trojan.InstallCube.118
Trojan.InstallCube.119
Trojan.InstallCube.120
Trojan.InstallCube.121
Trojan.InstallCube.122
Trojan.InstallCube.123
Trojan.InstallCube.124
Trojan.InstallCube.126
Trojan.InstallCube.127
Trojan.InstallCube.128
Trojan.InstallCube.1290
Trojan.InstallCube.130
Trojan.InstallCube.134
Trojan.InstallCube.135
Trojan.InstallCube.136
Trojan.InstallCube.138
Trojan.InstallCube.14
Trojan.InstallCube.142
Trojan.InstallCube.144
Trojan.InstallCube.148
Trojan.InstallCube.149
Trojan.InstallCube.150
Trojan.InstallCube.151
Trojan.InstallCube.152
Trojan.InstallCube.154
Trojan.InstallCube.155
Trojan.InstallCube.156
Trojan.InstallCube.157
Trojan.InstallCube.159
Trojan.InstallCube.16
Trojan.InstallCube.160
Trojan.InstallCube.162

1 2 3 4 5 6

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.