The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
A family of trojan applications whose main purpose is to download other malware, unwanted software, and adware to the target devices.
Trojan.DownLoader.6416.origin
Trojan.DownLoader.64167
Trojan.DownLoader.64168
Trojan.DownLoader.64181
Trojan.DownLoader.64185
Trojan.DownLoader.64186
Trojan.DownLoader.64187
Trojan.DownLoader.64191
Trojan.DownLoader.64193
Trojan.DownLoader.64194
Trojan.DownLoader.64195
Trojan.DownLoader.64198
Trojan.DownLoader.64199
Trojan.DownLoader.64200
Trojan.DownLoader.64204
Trojan.DownLoader.64205
Trojan.DownLoader.64206
Trojan.DownLoader.64207
Trojan.DownLoader.64208
Trojan.DownLoader.64209
Trojan.DownLoader.64210
Trojan.DownLoader.64211
Trojan.DownLoader.64212
Trojan.DownLoader.64214
Trojan.DownLoader.64215
Trojan.DownLoader.64216
Trojan.DownLoader.64217
Trojan.DownLoader.64218
Trojan.DownLoader.64219
Trojan.DownLoader.64220
Trojan.DownLoader.64221
Trojan.DownLoader.64222
Trojan.DownLoader.64223
Trojan.DownLoader.64224
Trojan.DownLoader.64225
Trojan.DownLoader.64227
Trojan.DownLoader.64228
Trojan.DownLoader.64229
Trojan.DownLoader.64230
Trojan.DownLoader.64231
Trojan.DownLoader.64232
Trojan.DownLoader.64233
Trojan.DownLoader.64234
Trojan.DownLoader.64235
Trojan.DownLoader.64237
Trojan.DownLoader.64239
Trojan.DownLoader.64240
Trojan.DownLoader.64241
Trojan.DownLoader.64242
Trojan.DownLoader.64243
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.