Cyber SecurityData Breaches

Google Plus To Shut Down Early After New API Bug Hits 52.5 Million Users


Google revealed that Google+ was affected by another huge data breach and they have been forced to shut down their social network four months earlier than it was actually scheduled to do which is April 2019 instead of August 2019.

Google had found a critical security vulnerability in one of Google+’s People APIs which will allow the developers to steal private information of around 52.5 million users, including their name, email address, occupation, and age.

The vulnerable API which is known as “People: get” has been designed to enable developers request basic information associated with a user profile.

The software update in November introduced the bug in the Google+ People API that allowed apps to view users’ information even if the profile was set as private.

The security issue was discovered by the engineers at Google during standard and ongoing testing procedures which was fixed within a week of the issue being introduced.

However, the company could not find any evidence of the vulnerability being exploited or its users’ data being misused by any third-party app developers.

Google has guaranteed their users that sensitive information such as passwords, financial data, national identification numbers etc. are not exposed by this API bug.

Google has announced the shutdown of Google+ for customers around two months ago when they discovered a massive data breach which exposed private data of more than 500,000 Google+ users to third-party developers. They decided to shut it down by the end of August 2019 when they failed to gain broad adoption or significant traction with its consumers. But due to the current security issue the company has decided to shut down its social media network in April 2019 instead of August.

Priyanka R
Cyber Security Enthusiast, Security Blogger, Technical Editor, Author at Cyber Safe News

    Google Removes 22 Apps from Play Store

    Previous article

    phpMyAdmin Releases Critical Software Update

    Next article

    You may also like


    Leave a reply

    Your email address will not be published. Required fields are marked *