Google Exposed hundreds of thousands of users’ data

Goolge exposed user's data

As Wall Street Journal report the security vulnerabilities in Google has put the thousands of users’ data in danger.

The news about leaking personal data is almost becoming common. This year wasn’t really a good year for the security of personal environment and data in Online World for users. After Facebook’s exposures, now it is time for Google to put us in danger by leaking our personal data by the vulnerabilities present in Google.

Google+ and Data Exposure

Wall Street Journal reports about the data reveal from hundreds of thousands of Google+ users. Google even didn’t inform any affected users about this. Though Google claims this bug was discovered and fixed in the March of this year but it seems like regulatory checking and the fines made Google not to announce it.

According to the Wall Street Journal’s sources as well as documents reviewed by the publication, a software vulnerability gave outside developers access to private Google+ user data between 2015 and 2018. And an internal memo noted that while there wasn’t any evidence of misuse on behalf of developers, there wasn’t a way to know for sure whether any misuse took place. Google said that it also found no evidence that any of the developers behind the 438 applications that used the API in question were aware of the bug. Exposed data included names, email addresses, birth dates, gender, profile photos, places lived, occupation and relationship status.



Though before developers could use Google+ profile information by the permission of user but the bug made it possible to get personal information of the friends of hunted user. Google said in a blogpost that nearly 500,000 users may have been impacted, but because the company keeps the log data from this specific API for only two weeks at a time, it can’t fully confirm who was truly impacted and who was not. The company noted that information like Google+ posts, messages and G Suite content weren’t included in the exposure.

 

Leave a Reply