The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
A family of trojan applications whose main purpose is to download other malware, unwanted software, and adware to the target devices.
Trojan.DownLoader.64266
Trojan.DownLoader.64267
Trojan.DownLoader.64268
Trojan.DownLoader.64269
Trojan.DownLoader.64270
Trojan.DownLoader.64271
Trojan.DownLoader.64272
Trojan.DownLoader.64273
Trojan.DownLoader.64274
Trojan.DownLoader.64275
Trojan.DownLoader.64276
Trojan.DownLoader.64277
Trojan.DownLoader.64279
Trojan.DownLoader.64280
Trojan.DownLoader.64282
Trojan.DownLoader.64283
Trojan.DownLoader.64284
Trojan.DownLoader.64285
Trojan.DownLoader.64286
Trojan.DownLoader.64289
Trojan.DownLoader.6429.origin
Trojan.DownLoader.64290
Trojan.DownLoader.64291
Trojan.DownLoader.64292
Trojan.DownLoader.64293
Trojan.DownLoader.64294
Trojan.DownLoader.64295
Trojan.DownLoader.64296
Trojan.DownLoader.64297
Trojan.DownLoader.64298
Trojan.DownLoader.64299
Trojan.DownLoader.64300
Trojan.DownLoader.64301
Trojan.DownLoader.64303
Trojan.DownLoader.64305
Trojan.DownLoader.64306
Trojan.DownLoader.64307
Trojan.DownLoader.64310
Trojan.DownLoader.64316
Trojan.DownLoader.64318
Trojan.DownLoader.64319
Trojan.DownLoader.64320
Trojan.DownLoader.64321
Trojan.DownLoader.64322
Trojan.DownLoader.64324
Trojan.DownLoader.64325
Trojan.DownLoader.64326
Trojan.DownLoader.64327
Trojan.DownLoader.64331
Trojan.DownLoader.64333
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.