The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
A family of trojan applications whose main purpose is to download other malware, unwanted software, and adware to the target devices.
Trojan.DownLoader.64037
Trojan.DownLoader.64038
Trojan.DownLoader.64039
Trojan.DownLoader.64040
Trojan.DownLoader.64041
Trojan.DownLoader.64042
Trojan.DownLoader.64043
Trojan.DownLoader.64045
Trojan.DownLoader.64047
Trojan.DownLoader.64052
Trojan.DownLoader.64053
Trojan.DownLoader.64054
Trojan.DownLoader.64056
Trojan.DownLoader.64057
Trojan.DownLoader.64058
Trojan.DownLoader.64059
Trojan.DownLoader.64060
Trojan.DownLoader.64062
Trojan.DownLoader.64064
Trojan.DownLoader.64068
Trojan.DownLoader.6407.origin
Trojan.DownLoader.64072
Trojan.DownLoader.64073
Trojan.DownLoader.64075
Trojan.DownLoader.64081
Trojan.DownLoader.64086
Trojan.DownLoader.64089
Trojan.DownLoader.64090
Trojan.DownLoader.64092
Trojan.DownLoader.64093
Trojan.DownLoader.64097
Trojan.DownLoader.64098
Trojan.DownLoader.64099
Trojan.DownLoader.64104
Trojan.DownLoader.64146
Trojan.DownLoader.64147
Trojan.DownLoader.64148
Trojan.DownLoader.64149
Trojan.DownLoader.64150
Trojan.DownLoader.64152
Trojan.DownLoader.64153
Trojan.DownLoader.64154
Trojan.DownLoader.64155
Trojan.DownLoader.64156
Trojan.DownLoader.64157
Trojan.DownLoader.64159
Trojan.DownLoader.64160
Trojan.DownLoader.64161
Trojan.DownLoader.64165
Trojan.DownLoader.64166
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.