The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
A family of trojan applications whose main purpose is to download other malware, unwanted software, and adware to the target devices.
Trojan.DownLoader.64211
Trojan.DownLoader.64212
Trojan.DownLoader.64214
Trojan.DownLoader.64215
Trojan.DownLoader.64216
Trojan.DownLoader.64217
Trojan.DownLoader.64218
Trojan.DownLoader.64219
Trojan.DownLoader.64220
Trojan.DownLoader.64221
Trojan.DownLoader.64222
Trojan.DownLoader.64223
Trojan.DownLoader.64224
Trojan.DownLoader.64225
Trojan.DownLoader.64227
Trojan.DownLoader.64228
Trojan.DownLoader.64229
Trojan.DownLoader.64230
Trojan.DownLoader.64231
Trojan.DownLoader.64232
Trojan.DownLoader.64233
Trojan.DownLoader.64234
Trojan.DownLoader.64235
Trojan.DownLoader.64237
Trojan.DownLoader.64239
Trojan.DownLoader.64240
Trojan.DownLoader.64241
Trojan.DownLoader.64242
Trojan.DownLoader.64243
Trojan.DownLoader.64244
Trojan.DownLoader.64246
Trojan.DownLoader.64247
Trojan.DownLoader.64248
Trojan.DownLoader.64249
Trojan.DownLoader.6425.origin
Trojan.DownLoader.64250
Trojan.DownLoader.64252
Trojan.DownLoader.64253
Trojan.DownLoader.64254
Trojan.DownLoader.64255
Trojan.DownLoader.64256
Trojan.DownLoader.64257
Trojan.DownLoader.64258
Trojan.DownLoader.64259
Trojan.DownLoader.64260
Trojan.DownLoader.64261
Trojan.DownLoader.64262
Trojan.DownLoader.64263
Trojan.DownLoader.64264
Trojan.DownLoader.64265
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.