The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
A family of trojan applications whose main purpose is to download other malware, unwanted software, and adware to the target devices.
Trojan.DownLoader.64518
Trojan.DownLoader.64519
Trojan.DownLoader.64520
Trojan.DownLoader.64523
Trojan.DownLoader.64524
Trojan.DownLoader.64526
Trojan.DownLoader.64529
Trojan.DownLoader.64533
Trojan.DownLoader.64535
Trojan.DownLoader.64536
Trojan.DownLoader.64537
Trojan.DownLoader.64540
Trojan.DownLoader.64541
Trojan.DownLoader.64542
Trojan.DownLoader.64545
Trojan.DownLoader.64548
Trojan.DownLoader.64550
Trojan.DownLoader.64551
Trojan.DownLoader.64552
Trojan.DownLoader.64553
Trojan.DownLoader.64554
Trojan.DownLoader.64556
Trojan.DownLoader.64557
Trojan.DownLoader.64558
Trojan.DownLoader.64559
Trojan.DownLoader.64560
Trojan.DownLoader.64561
Trojan.DownLoader.64562
Trojan.DownLoader.64564
Trojan.DownLoader.64566
Trojan.DownLoader.64567
Trojan.DownLoader.64568
Trojan.DownLoader.64570
Trojan.DownLoader.64571
Trojan.DownLoader.64572
Trojan.DownLoader.64573
Trojan.DownLoader.64575
Trojan.DownLoader.64577
Trojan.DownLoader.64578
Trojan.DownLoader.64579
Trojan.DownLoader.64583
Trojan.DownLoader.64584
Trojan.DownLoader.64585
Trojan.DownLoader.64591
Trojan.DownLoader.64602
Trojan.DownLoader.64603
Trojan.DownLoader.64604
Trojan.DownLoader.64606
Trojan.DownLoader.64607
Trojan.DownLoader.64608
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.