The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
A family of trojan applications whose main purpose is to download other malware, unwanted software, and adware to the target devices.
Trojan.DownLoader.61556
Trojan.DownLoader.61596
Trojan.DownLoader.62265
Trojan.DownLoader.62549
Trojan.DownLoader.62609
Trojan.DownLoader.62773
Trojan.DownLoader.6288.origin
Trojan.DownLoader.62973
Trojan.DownLoader.6298.origin
Trojan.DownLoader.6342.origin
Trojan.DownLoader.6372.origin
Trojan.DownLoader.63828
Trojan.DownLoader.63886
Trojan.DownLoader.63887
Trojan.DownLoader.64019
Trojan.DownLoader.64021
Trojan.DownLoader.64022
Trojan.DownLoader.64027
Trojan.DownLoader.64028
Trojan.DownLoader.64029
Trojan.DownLoader.64032
Trojan.DownLoader.64033
Trojan.DownLoader.64034
Trojan.DownLoader.64035
Trojan.DownLoader.64037
Trojan.DownLoader.64038
Trojan.DownLoader.64039
Trojan.DownLoader.64040
Trojan.DownLoader.64041
Trojan.DownLoader.64042
Trojan.DownLoader.64043
Trojan.DownLoader.64045
Trojan.DownLoader.64047
Trojan.DownLoader.64052
Trojan.DownLoader.64053
Trojan.DownLoader.64054
Trojan.DownLoader.64056
Trojan.DownLoader.64057
Trojan.DownLoader.64058
Trojan.DownLoader.64059
Trojan.DownLoader.64060
Trojan.DownLoader.64062
Trojan.DownLoader.64064
Trojan.DownLoader.64068
Trojan.DownLoader.6407.origin
Trojan.DownLoader.64072
Trojan.DownLoader.64073
Trojan.DownLoader.64075
Trojan.DownLoader.64081
Trojan.DownLoader.64086
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.