Read the Beforeitsnews.com story here. Advertise at Before It's News here.
Profile image
By BARRACUDA (Reporter)
Contributor profile | More stories
Story Views
Now:
Last hour:
Last 24 hours:
Total:

If You See This Google Warning, Act Fast: Big Brother is Watching

% of readers think this story is Fact. Add your two cents.


August 05 2012

Story at-a-glance

  • A massive data-mining virus named “Flame” has been detected in computers in the Middle East, particularly in Iran. It’s the first virus found with the added ability to spread wirelessly by attaching itself to Bluetooth-enabled devices. Once there, it can trace and steal information stored on those devices. The program also contains a “microbe” command that can activate any microphone within the device and record audio files
  • The NSA is building a massive spy center in Bluffdale, Utah, which will intercept, decipher, analyze, and store vast amounts of the world’s communications—both foreign and domestic
  • As of the first week of June, Google will warn you when it picks up activity on your computer account that looks suspiciously like state-sponsored monitoring of your computer activities
  • To re-secure your account, Google recommends creating a unique password that includes a mix of capital letter, lowercase letters, punctuation marks and numbers; enable 2-step verification; and update your browser, operating system, plugins, and document editors Continued below.
  •  Obama Planning Military Takeover In October, 2012. No National Election If Obama Has His Way!

  •  “Imminent Terror Attack On London?”

  •  

    By Dr. Mercola

    Big Brother is watching. No kidding. And the warning is coming from none other than Google, which says government spies may be spying on you. Some believe the Google announcement may be related to the recent discovery of the data-mining virus named “Flame.” In a June 3 New York Times article, Andrew Kramer and Nicole Perlroth write1:

    “When Eugene Kaspersky, the founder of Europe’s largest antivirus company, discovered the Flame virus that is afflicting computers in Iran and the Middle East, he recognized it as a technologically sophisticated virus that only a government could create.

    He also recognized that the virus, which he compares to the Stuxnet virus built by programmers employed by the United States and Israel, adds weight to his warnings of the grave dangers posed by governments that manufacture and release viruses on the internet.

    “Cyberweapons are the most dangerous innovation of this century,” he told a gathering of technology company executives… While the United States and Israel are using the weapons to slow the nuclear bomb-making abilities of Iran, they could also be used to disrupt power grids and financial systems or even wreak havoc with military defenses.”

    Mr. Kaspersky claims he was called in to investigate the new virus on behalf of the International Telecommunication Union, an agency of the United Nations. The virus was allegedly erasing files on computers belonging to the Iranian oil ministry.

    What makes the Flame virus a major potential concern for common citizens of the world is the fact that it’s the first virus found with the ability to spread wirelessly by attaching itself to Bluetooth-enabled devices.

    Once there, it can not only trace and steal information stored on those devices; according to Kramer and Perlroth the program also contains a “microbe” command that can activate any microphone within the device, record whatever is going on at the time—presumably whether you’re actually using the device or not—and transmit audio files back to the attacker. This, clearly, has huge privacy implications were it to be deployed against civilian populations.

    New Revelations about the Links Between Flame and Stuxnet

    While cybersecurity experts initially claimed there were no links between the earlier Stuxnet worm and the Flame virus, a recent article on The Verge now reports that the two are undoubtedly related2. Joshua Kopstein writes:

    “[I]n examining an earlier version of Stuxnet, the lab’s researchers now find that they were wrong: a previously overlooked module within the virus is now providing the “missing link” between the two pieces of malware. The module in question… matches very closely with a module used by an early version Flame. “It was actually so similar, that it made our automatic system classify it as Stuxnet,” wrote Alexander Gostev… indicating that the module was likely the seed of both viruses. “We think it’s actually possible to talk about a ‘Flame’ platform, and that this particular module was created based on its source code.”

    The new evidence suggests that Stuxnet and Flame are two sides of the same coin, with the former built for sabotage and the latter for surveillance. But researchers also say that the Flame platform pre-dated Stuxnet and its sister, Duqu, and was likely built in the Summer of 2008.”

    InformationWeek Security recently offered the following advice3:”… Microsoft has been working quickly to patch the certificate bug exploited by Flame. Notably, Microsoft released an update Friday [June 8] for Windows Server Update Services (WSUS) 3.0 Service Pack 2 (SP2), which according to the release notes “strengthens the WSUS communication channels … [by] trusting only files that are issued by the Microsoft Update certification authority.”

    Microsoft is also set to issue an update Tuesday–as part of its monthly Patch Tuesday–that will further update all supported versions of Windows to block Flame. Security experts are recommending that all users install the update as soon as possible, since attackers will likely attempt to use the certificate vulnerability before it becomes widely patched. “Apply the certificate patch released a week ago today if you haven’t done so already,” said SANS Institute chief research officer Johannes B. Ullrich in a blog post. “This way, no patch signed by the bad certificate should be accepted tomorrow. Patch Tuesday is one of the best dates to launch such an attack, as you do expect patches anyway.”

    When installing the update, however, do so preferably only if using a trusted environment. “Avoid patches while ‘on the road.’ Apply them in your home [or] work network whenever possible,” said Ullrich. “This doesn’t eliminate the chance of a ‘man in the middle’ (MitM) attack, but it reduces the likelihood.”

    For users who must update while on the road, perhaps because they travel frequently, always use a VPN connection back to the corporate network, said Ullrich, since hotel networks can be malware and attack hotbeds. “Hotel networks and public hotspots frequently use badly configured HTTP proxies that can be compromised and many users expect bad SSL certificates–because of ongoing MitM attacks,” he said.”

    more here



Before It’s News® is a community of individuals who report on what’s going on around them, from all around the world.

Anyone can join.
Anyone can contribute.
Anyone can become informed about their world.

"United We Stand" Click Here To Create Your Personal Citizen Journalist Account Today, Be Sure To Invite Your Friends.

Please Help Support BeforeitsNews by trying our Natural Health Products below!


Order by Phone at 888-809-8385 or online at https://mitocopper.com M - F 9am to 5pm EST

Order by Phone at 888-388-7003 or online at https://www.herbanomic.com M - F 9am to 5pm EST

Order by Phone at 888-388-7003 or online at https://www.herbanomics.com M - F 9am to 5pm EST


Humic & Fulvic Trace Minerals Complex - Nature's most important supplement! Vivid Dreams again!

HNEX HydroNano EXtracellular Water - Improve immune system health and reduce inflammation

Ultimate Clinical Potency Curcumin - Natural pain relief, reduce inflammation and so much more.

MitoCopper - Bioavailable Copper destroys pathogens and gives you more energy. (See Blood Video)
Oxy Powder - Natural Colon Cleanser!  Cleans out toxic buildup with oxygen! 
Nascent Iodine - Promotes detoxification, mental focus and thyroid health.
Smart Meter Cover -  Reduces Smart Meter radiation by 96%!  (See Video)

Report abuse

    Comments

    Your Comments
    Question   Razz  Sad   Evil  Exclaim  Smile  Redface  Biggrin  Surprised  Eek   Confused   Cool  LOL   Mad   Twisted  Rolleyes   Wink  Idea  Arrow  Neutral  Cry   Mr. Green

    Total 23 comments
    • YOU

      If you have an electronic device, it is accessible world wide, for those with access. No virus must be installed. Every system windows, ios, linux, any program, has back door entry for those with access. This article is BS. If I had access, I could log into your computer, phone, ipad, as easily as I log in to an amazon account. Even if you were not online, even if you thought you didn’t have internet access at the time. Your device is still accessible. I could listen to anything happening within range, see through the camera of the device, etc… All levels of encryption can be read in real time, with access. This has been out there for a while. The word privacy is just a comfort word for your mind. It does not exist. That is why it is best to just do what you know to be right. Nothing is outside of God anyways.

      • Anonymous

        Good advise,but if this is true can they(whoever),put things on your computer to frame you?

        • YOU

          The technology is there, but I can’t even imagine what kind of stuff someone would dabble in to get that kind of attention. I mean, there are some big fish out there – I don’t think they are worried about petty random online comments.

      • MoPatriot

        ROFL LMAO …… you couldnt get past a piece of paper with a sword.

    • Diplomat

      I received this email from google yesterday with the title “suspicious sign in prevented” as soon as I read the headline of this article it kind of freaked me out a little bit….here is the exact email i received “Someone recently tried to use an application to sign in to your Google Account, [email protected]. We prevented the sign-in attempt in case this was a hijacker trying to access your account. Please review the details of the sign-in attempt:

      Saturday, August 4, 2012 8:10:12 PM GMT
      IP Address: …………… (mycingular.net)
      Location: Fountainebleau, FL, USA

      If you do not recognize this sign-in attempt, someone else might be trying to access your account. You should sign in to your account and reset your password immediately. Find out how at http://support.google.com/accounts?p=reset_pw

      If this was you, and you want to give this application access to your account, complete the troubleshooting steps listed at http://support.google.com/mail?p=client_login

      Sincerely,
      The Google Accounts Team

    • Anonymous

      @ YOU

      QUOTE: “I could log into your computer, phone, ipad, as easily as I log in to an amazon account. Even if you were not online”

      in your dreams chump.

      your belief in the super sky fairy makes anything you say not credible in the least. idiot myth hugger

      • YOU

        I am not saying that I can do that, but that they technology exists for that to be done. You took that out of context. I am saying that technology and programming is far more advanced than you or I know.

        It would be a fantasy of an idiot myth huger to believe that it is not possible.

    • WatchmanOfEzekiel33

      @You. Then tell me what the background image is on my Facebook if you are so good.

      • pattiesimmons

        Good Grief! You TOLD you he COULD NOT do it BUT that the technology To do it is already out there!
        Why do you want to start a fight! Just stop it.

    • Pix

      Yep, best way to defend against such things is go into your kitchen, find a roll of tin foil and wrap it around your head. ;)

    • SteelMist

      Erm…. A somewhat ironic quick Google search for who owns Google shows up articles like “DOJ Asks Court To Keep Secret Google / NSA Partnership” that states “”The Justice Department is defending the government’s refusal to discuss — or even acknowledge the existence of — any cooperative research and development agreement between Google and the National Security Agency. The Washington based advocacy group Electronic Privacy Information Center sued in federal district court here to obtain documents about any such agreement between the Internet search giant and the security agency. The NSA responded to the suit with a so-called ‘Glomar’ response in which the agency said it could neither confirm nor deny whether any responsive records exist. U.S. District Judge Richard Leon in Washington sided with the government last July.” ”

      Then there’s also the one entitled “Google-CIA-NSA Connections” that states “Consumer Watchdog’s latest complaints about the relationship of Google and the Obama administration are outlined in a 32-page report.

      The paper questions a decision by NASA allowing Google executives to use its Moffett Federal Airfield near Google headquarters. Although H211, a company controlled by Google top executives, pays NASA rent, they enjoy access to the airfield that other companies or groups don’t have, Simpson said.

      The paper also questions Google contracts with the U.S. Department of Defense and other agencies, suggesting that, in some cases, Google contracts were fast-tracked. The paper also questions Google’s relationship with the U.S. National Security Agency and calls for the company to be more open about what consumer information it shares with the spy agency.

      When asked if other companies, including broadband providers, should disclose what customer information they share with the NSA, Simpson said they should, too.

      “I understand the NSA is a super-secret spook organization,” he said. “But given Google’s very special situation where it possesses so much personal data about people, I think that there ought to be a little more openness about what precisely goes on between the two.” “

    • IRHologram

      AM I THAT uneasy to confuse? If I see WHAT Google warning? What was the warning? I want to know. Enquiring minds want to know…especially if I’m suckered I to article. Usually I have the utmost respect for Dr. Mercola. Not that I don’t believe this info is so…on a dating site…with a very secure password, my entire “self” was hijacked.” they’re probably using me to sucker folks out of a phone boiler room in Nigeria. Lol. Which is flattering, BUT I still want to know. Did I miss it in the article? What Google warning, in particular?

    • YOU

      I did not say that I can do that. I said the technology is available to do that. If I could do that, I would be the highest salaried plumber you know.

    • YOU

      Read the original comment again. Your feeble mind cannot even put words into sentences. I said that the technology exists. I did not say that I can do it. For how close your name is to brain, I thought you would understand.

    • YOU

      Lol. Better make that a double layer with the cookies responding to my post, who can’t even figure out simple sentences.

    • building 5

      Thanks, YOU.

    • Ardin

      If you’re stupid enough not to monitor your computer/web capable devices and send personal information everywhere willy-nilly then I think you are just asking for your data to be collected and used.
      This is as stupid as those Facebook users who, after giving Facebook all of their personal information, then felt it was a security threat to have Facebook know about them.

      If you don’t want anyone to know – DON’T FREAKING SHARE YOUR INFORMATION.

    • Anonymous

      Not only is “YOU” right, I was told about the unlimited access to your electronics back around 1990. At that time, there was a facility at Peterson AFB, just outside Colorado Springs, CO, where a multi-storied building filled on every floor with Cray super computers was actively recording every telecom call being made on Earth. The Echelon program was instituted to track certain words or individuals through voice print technology. In the last twenty years, the technology has evolved to several more advanced generations of data monitoring and collection. This is not science fiction. Google: “Lithium Niobate Ring Resonator”. This microscopic passive transmitter device can be etched on substrate materials small enough to be injected when you got that flu shot, and can track you from a substantial distance. And this is but one technology being used on us. Think chemtrails are just the product of an over-active imagination? Watch “Why In The World Are They Spraying” and the previous film. You’ll be surprised at just how pervasive these plans are.

    • IRHologram

      Just in case your comment was aimed at me, my dating site information was all blah, blah, and meaningless stuff, but it did have pictures. No nothing personal, just boy-girl hype. My point was, a third party and probably not the government, appropriated the entire content and made it unavailablee to me in case I wanted to copy it (it was wonderful BS…well what else are you going to say on a dating site? Just stuff and none sense and funny drivel.) this was off of the most prominent, nationally recognized, and supposedly extremely encrypted site. So my point was MANY entities data mine…not just the government.

    • Rico Millan

      Good, I’ll make sure that they get the proverbial middle finger in ASCII too!

    • TimOsman

      Pix

      Yep, best way to defend against such things is go into your kitchen, find a roll of tin foil and wrap it around your head. ”

      Your Mama has a tin foil hat stuffed with Olympic condoms !

    • Anonymous

      my camera turned on when i viewed this page…

    • Anonymous

      @ you -

      so you think you know how much other people may or may not know now huh?

      heres 50 cents chuckles.. go rent a clue

    MOST RECENT
    Load more ...

    SignUp

    Login

    Newsletter

    Email this story
    Email this story

    If you really want to ban this commenter, please write down the reason:

    If you really want to disable all recommended stories, click on OK button. After that, you will be redirect to your options page.