The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
A family of trojan applications whose main purpose is to download other malware, unwanted software, and adware to the target devices.
Trojan.DownLoader.64244
Trojan.DownLoader.64246
Trojan.DownLoader.64247
Trojan.DownLoader.64248
Trojan.DownLoader.64249
Trojan.DownLoader.6425.origin
Trojan.DownLoader.64250
Trojan.DownLoader.64252
Trojan.DownLoader.64253
Trojan.DownLoader.64254
Trojan.DownLoader.64255
Trojan.DownLoader.64256
Trojan.DownLoader.64257
Trojan.DownLoader.64258
Trojan.DownLoader.64259
Trojan.DownLoader.64260
Trojan.DownLoader.64261
Trojan.DownLoader.64262
Trojan.DownLoader.64263
Trojan.DownLoader.64264
Trojan.DownLoader.64265
Trojan.DownLoader.64266
Trojan.DownLoader.64267
Trojan.DownLoader.64268
Trojan.DownLoader.64269
Trojan.DownLoader.64270
Trojan.DownLoader.64271
Trojan.DownLoader.64272
Trojan.DownLoader.64273
Trojan.DownLoader.64274
Trojan.DownLoader.64275
Trojan.DownLoader.64276
Trojan.DownLoader.64277
Trojan.DownLoader.64279
Trojan.DownLoader.64280
Trojan.DownLoader.64282
Trojan.DownLoader.64283
Trojan.DownLoader.64284
Trojan.DownLoader.64285
Trojan.DownLoader.64286
Trojan.DownLoader.64289
Trojan.DownLoader.64290
Trojan.DownLoader.64291
Trojan.DownLoader.64292
Trojan.DownLoader.64293
Trojan.DownLoader.64294
Trojan.DownLoader.64295
Trojan.DownLoader.64296
Trojan.DownLoader.64297
Trojan.DownLoader.64298
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.