Trend Micro Facebook TrendLabs Twitter Malware Blog RSS Feed You Tube - Trend Micro
Search our blog:

  • Recent Posts

  • Calendar

    July 2014
    S M T W T F S
    « Jun    
     12345
    6789101112
    13141516171819
    20212223242526
    2728293031  
  • About Us

    Sep27
    11:21 am (UTC-7)   |    by


    As of time of writing, no security firm or individual has been able to confirm the credibility of the report. The security community awaitedly asking for the binaries of the much hyped worm to further prove to the public that they really exists but even the individual (Vlad) who claims that his machine has been infected can not provide one.

    Vlad had even posted a TCPDump of the said activity of the Wi-Fi worm but what is noticeable upon skimming through the log is the fact that there is no 802.11 traffic that can be extracted from the log because all are Ethernet traffic.

    I guess this issue has been so much a hyped just to get the attention of some individuals/firms. I’d say he has succeeded even this early because even people from Internet Storm Center has devoted time to do some passive analysis on the area.

    But, nobody has been able to provide consistent and real proofs.
    As of time of writing, no security firm or individual has been able to confirm the credibility of the report. The security community awaitedly asking for the binaries of the much hyped worm to further prove to the public that they really exists but even the individual (Vlad) who claims that his machine has been infected can not provide one.





    Share this article
    Get the latest on malware protection from TrendLabs
    Email this story to a friend   Technorati   NewsVine   MySpace   Google   Live   del.icio.us   StumbleUpon




    Comments are closed.



     

    © Copyright 2013 Trend Micro Inc. All rights reserved. Legal Notice