The malware works in the background after pretending to shut down a phone, AVG said.
Hunter Moore was accused of acquiring nude photos from hacked Gmail and Yahoo accounts
A setup mistake could put the routers at risk of being compromised, and there's no easy way for consumers to identify or fix the problem.
Blackshades was widely used in the cybercriminal underground for about three years
Trend Micro said two campaigns, one sophisticated and one not, shared the same infrastructure
The Equation Group's attack on hard-drive firmware is one of the most advanced ever discovered, Kaspersky Lab said
Once inside a bank's network, the gang studied how the institution performed wire transfers in order to better mask fraud.
Some were nearly identical copies of PayPal's website, OpenDNS said.
The Core Infrastructure Initiative will have a list ready within a few months
Users are advised to upgrade to version 4.0.6035
Auto-updates should be available Wednesday, with a manual update coming Thursday
Income data, Social Security numbers, names and addresses were stolen
For non-modified iPhones and Android devices, American companies create the highest number of questionable apps
New vulnerabilities in Flash combined with malicious ads are helping attackers.
Victims were tricked into a photo swap on Skype, which planted malware on computers, said FireEye