The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
Programs belonging to this category are not malicious but at the same time not exactly useful either. Sometimes these programs can urge the user to purchase their full version (usually a useless one). Some of these programs can interrupt a stable running of the system.
In particular, to the Program.Unwanted category belong “cleaning” utilities or utilities for Windows registry optimization, numerous programs for “speeding up Internet connection”, “freeing up disk space”, “improving computer performance”, “updating drivers”, and other applications allegedly used to “speed up user’s computer” or to “scan” a computer for errors. In most cases, these programs “detect” non-existing problems urging the user to purchase a full version of the program to troubleshoot them. There have been some cases, when, due to errors in their code, such programs caused system failures, for example, BSOD (“Blue Screen of Death”).
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.