The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
Android.HiddenAds is the detection name for trojan programs that display intrusive ads. Members of this family are distributed under the guise of harmless apps so as not to make users suspicious. At the same time, in some cases, they can be installed in the system directory.
Android.HiddenAds adware trojans try to conceal their presence on infected devices. For example, they “hide” their icons from the home screen menu. Some variants of these trojans do not create any icons at all, or they replace them with other ones.
Android.HiddenAds.957
Android.HiddenAds.960
Android.HiddenAds.961
Android.HiddenAds.962
Android.HiddenAds.963
Android.HiddenAds.964
Android.HiddenAds.965
Android.HiddenAds.967
Android.HiddenAds.968
Android.HiddenAds.969
Android.HiddenAds.972
Android.HiddenAds.973
Android.HiddenAds.974
Android.HiddenAds.975
Android.HiddenAds.976
Android.HiddenAds.978
Android.HiddenAds.979
Android.HiddenAds.980
Android.HiddenAds.981
Android.HiddenAds.982
Android.HiddenAds.983
Android.HiddenAds.984
Android.HiddenAds.985
Android.HiddenAds.986
Android.HiddenAds.987
Android.HiddenAds.988
Android.HiddenAds.989
Android.HiddenAds.992
Android.HiddenAds.993
Android.HiddenAds.998
Android.HiddenAds.999
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.