Google Plus to Shutter Early Due to Second Data Breach

Google Plus to Shutter Early Due to Second Data Breach

As a result of the latest breach, the company now plans to shutter Google Plus by April 2019, and cease access to its APIs in the next 90 days.

Google will be shutting down its social network, Google Plus, earlier than previously announced due to the discovery of a new security vulnerability affecting 52.5 million users. The latest data breach is the second Google Plus security issue disclosed by Google in three months.

In early October, Google disclosed a security bug that had exposed the account information of 500,000 users, including names, email addresses and jobs. Google said at the time that it planned to shut down the social network by August 2019.

On Monday, Google disclosed in a blog post that a second security bug had been discovered. The vulnerability allowed 52.5 million users’ profile information, even if it was set to private, to be viewed by developers using one of the company’s application programming interfaces for six days in November. Again, the vulnerable data included names, email addresses, jobs and ages of users.

According to Google, third-party apps did not have access to users’ financial data or passwords due to the bug, and the company didn’t find any evidence that the private information was accessed or misused. But as a result of the latest breach, the company now plans to shutter Google Plus by April 2019, and cease access to its APIs in the next 90 days.

“We understand that our ability to build reliable products that protect your data drives user trust,” Google’s blog post read.

“We have always taken this seriously, and we continue to invest in our privacy programs to refine internal privacy review processes, create powerful data controls, and engage with users, researchers, and policymakers to get their feedback and improve our programs.”

About the Author

Jessica Davis is the Associate Content Editor for 1105 Media.

Featured

  • Maximizing Your Security Budget This Year

    7 Ways You Can Secure a High-Traffic Commercial Security Gate  

    Your commercial security gate is one of your most powerful tools to keep thieves off your property. Without a security gate, your commercial perimeter security plan is all for nothing. Read Now

  • Elevating Security

    Willis Tower, an iconic symbol in Chicago for more than 50 years, has undergone significant transformations to become a modern workplace and community hub that delivers the best experiences for its tenants, area residents and visitors. Originally known as Sears Tower, it was renamed Willis Tower after a change in ownership in 2009. Read Now

  • Digital Access in the Workplace

    It is simple to set up a unified, robust access control solution for one tenant leasing one building. It is even easier if the tenant owns the property. But what is involved when multiple companies lease space in a building? And what about companies that have multiple buildings in the same city or locations across various regions in the country and the world? Read Now

  • Texas City Replaces Locks on Intelligent Traffic Cabinets With More Secure Option

    The Transportation Services and Mobility department for the city of Grand Prairie, Texas recently completed a substantial project to replace the locks on their Intelligent Traffic Cabinets with a better and more secure choice. Turns out what they needed was only a few miles away with ALCEA’s Traffic Cabinet Locking Solution powered by ABLOY technology. Read Now

Featured Cybersecurity

Webinars

New Products

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3

  • Hanwha QNO-7012R

    Hanwha QNO-7012R

    The Q Series cameras are equipped with an Open Platform chipset for easy and seamless integration with third-party systems and solutions, and analog video output (CVBS) support for easy camera positioning during installation. A suite of on-board intelligent video analytics covers tampering, directional/virtual line detection, defocus detection, enter/exit, and motion detection. 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3