Gmail Privacy Hole Shows User Names - InformationWeek
IoT
IoT
Mobile // Mobile Applications
News
7/16/2008
02:45 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%
RELATED EVENTS
Building Security for the IoT
Nov 09, 2017
In this webcast, experts discuss the most effective approaches to securing Internet-enabled system ...Read More>>

Gmail Privacy Hole Shows User Names

Sharing a Google Calendar with another Gmail user can expose the first name and last name that the recipient of the shared calendar supplied to set up a Gmail account.

Finding out the name with which someone registered his or her Google Gmail account is as easy as sharing a Google Calendar.

Security researcher Aviram Jenik on Tuesday published details about this privacy oversight in a blog post. He attributes the issue to the strong linkage between Google's various services.

By sharing a Google Calendar with another Gmail user, the sharer is able to see the first name and last name that the recipient of the shared calendar supplied to set up a Gmail account.

At the time this article was written, Jenik's technique still worked. A Google spokesperson said in an e-mail: "This is not a security issue. It was originally incorporated into the product to make it easier to send Calendar invites to Gmail users. However, we are currently taking steps to remove it."

For those who include their first and last names, or some variation, in their Gmail addresses, there's no real privacy issue since the address itself already exposes the information.

But for those with pseudonymous Gmail addresses or Gmail addresses with a deliberate generic association, such as "yourproductcomplaintswillbeignored@gmail.com," the revelation of the first and last name supplied by the account holder could be undesirable.

Not everyone who signs up for a Gmail account supplies accurate name information of course. But even placeholder information may play a role in identifying someone if that information can be associated with the individual through a Web search.

For example, an alleged identity thief was recently identified using a Google search in part because he supplied his first name while registering for an IM client account.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
2017 State of IT Report
In today's technology-driven world, "innovation" has become a basic expectation. IT leaders are tasked with making technical magic, improving customer experience, and boosting the bottom line -- yet often without any increase to the IT budget. How are organizations striking the balance between new initiatives and cost control? Download our report to learn about the biggest challenges and how savvy IT executives are overcoming them.
Video
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll