The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
A family of trojan applications whose main purpose is to download other malware, unwanted software, and adware to the target devices.
Trojan.DownLoader.64430
Trojan.DownLoader.64431
Trojan.DownLoader.64432
Trojan.DownLoader.64435
Trojan.DownLoader.64436
Trojan.DownLoader.64442
Trojan.DownLoader.64443
Trojan.DownLoader.64444
Trojan.DownLoader.64448
Trojan.DownLoader.64449
Trojan.DownLoader.64451
Trojan.DownLoader.64452
Trojan.DownLoader.64454
Trojan.DownLoader.64455
Trojan.DownLoader.64456
Trojan.DownLoader.64457
Trojan.DownLoader.64458
Trojan.DownLoader.64460
Trojan.DownLoader.64462
Trojan.DownLoader.64463
Trojan.DownLoader.64464
Trojan.DownLoader.64466
Trojan.DownLoader.64467
Trojan.DownLoader.64468
Trojan.DownLoader.64469
Trojan.DownLoader.64470
Trojan.DownLoader.64471
Trojan.DownLoader.64476
Trojan.DownLoader.64477
Trojan.DownLoader.64479
Trojan.DownLoader.64480
Trojan.DownLoader.64481
Trojan.DownLoader.64482
Trojan.DownLoader.64483
Trojan.DownLoader.64486
Trojan.DownLoader.64488
Trojan.DownLoader.64489
Trojan.DownLoader.64491
Trojan.DownLoader.64492
Trojan.DownLoader.64494
Trojan.DownLoader.64497
Trojan.DownLoader.64498
Trojan.DownLoader.64499
Trojan.DownLoader.64500
Trojan.DownLoader.64501
Trojan.DownLoader.64502
Trojan.DownLoader.64505
Trojan.DownLoader.64506
Trojan.DownLoader.64507
Trojan.DownLoader.64508
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.