The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
Trojan.InstallMonster.1000
Trojan.InstallMonster.1018
Trojan.InstallMonster.1020
Trojan.InstallMonster.1022
Trojan.InstallMonster.1023
Trojan.InstallMonster.1024
Trojan.InstallMonster.1026
Trojan.InstallMonster.1052
Trojan.InstallMonster.1061
Trojan.InstallMonster.1065
Trojan.InstallMonster.1066
Trojan.InstallMonster.1068
Trojan.InstallMonster.1070
Trojan.InstallMonster.1076
Trojan.InstallMonster.1094
Trojan.InstallMonster.1098
Trojan.InstallMonster.1106
Trojan.InstallMonster.1107
Trojan.InstallMonster.1111
Trojan.InstallMonster.1112
Trojan.InstallMonster.1118
Trojan.InstallMonster.1120
Trojan.InstallMonster.1121
Trojan.InstallMonster.1122
Trojan.InstallMonster.1126
Trojan.InstallMonster.1159
Trojan.InstallMonster.1170
Trojan.InstallMonster.1172
Trojan.InstallMonster.1182
Trojan.InstallMonster.120
Trojan.InstallMonster.1225
Trojan.InstallMonster.1229
Trojan.InstallMonster.1233
Trojan.InstallMonster.13
Trojan.InstallMonster.146
Trojan.InstallMonster.1477
Trojan.InstallMonster.1546
Trojan.InstallMonster.1549
Trojan.InstallMonster.1560
Trojan.InstallMonster.1573
Trojan.InstallMonster.1723
Trojan.InstallMonster.1747
Trojan.InstallMonster.1797
Trojan.InstallMonster.1975
Trojan.InstallMonster.209
Trojan.InstallMonster.21
Trojan.InstallMonster.2148
Trojan.InstallMonster.2191
Trojan.Installmonster
Trojan.Installmonster.1226
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.