Cybersecurity News You Can Use

LinkedIn Logo

LINKEDIN SUED FOR SHARING USER DATA TO TRAIN AI MODELS:  Some LinkedIn Premium users have filed a class-action lawsuit, alleging the platform shared their private messages with third parties to train large language models (LLMs). The suit claims LinkedIn quietly introduced a privacy setting last August, allowing users to opt in or out of data sharing. A month later, the company updated its privacy policy, stating user data could be used for AI training—while noting that opting out would not undo past data usage. The lawsuit seeks damages for breach of contract and $1,000 per person for violations of the federal Stored Communications Act.

Recommendations:

  • Select “Data Privacy,” then turn off the option under “Data for generative AI improvement.”
  • Limit how much personal information you share on your profile.
  • Don’t allow LinkedIn to sync your contacts.
  • Turn on two-factor authentication & password verification.
  • Toggle off “Advertising Data” in your profile settings.
  • Turn off “share key profile updates” to avoid broadcasting your updates.
  • Make yourself anonymous when looking at other profiles — Settings > Visibility > Profile viewing options.
Google

THAT’S NOT GOOGLE REACHING OUT TO YOU: The FBI is warning of a new phishing scam where attackers pose as Google Support. 

If you receive an unexpected call, text, or email claiming to be from Google, it’s a scam! Google does not call, text, or email users about security issues, account recovery, or technical support.

There are only two times when Google will contact you: when you first contact them about a lost password. You’ll get a verification code via email, text, or the Google authenticator app.

And Google also sends an email alert when it detects a suspicious login attempt on your account. Visit Google’s Security Checkup page to see what’s up (myaccount.google.com/security-checkup).

These organizations say they have been hacked recently. If you do business with any of these companies, change the password on your account and use two-factor authentication wherever possible.

Feb 15 logos b
15 Hacker Tools [CPS]
Chicago Public Schools logo showing silhouettes of a young student, a teenager, and a graduate holding a diploma inside a circle next to the organization name.

If you think you’ve clicked on a phishing email,
immediately change your password via the
Account Management Portal at https://portal.id.cps.edu
and notify us immediately by emailing
[email protected] so we can check it out.

One more thing...

Feb 15 cartoon

Answers to Your
Cybersecurity Questions

“With the two-factor identification process in place, why do we still need to use a strong password for connection? Why isn’t confirming our identity with a fingerprint or a face scan enough?” — A. Cariou

This might seem like a hassle, but it’s worth your time! Two-factor authentication (2FA) provides an extra layer of security. While biometrics like facial recognition and fingerprints are convenient, they’re not foolproof—high-quality photos or deepfakes can trick facial recognition, and fingerprints can be lifted and replicated. Some devices even allow password fallback if biometrics fail. If an attacker steals or clones your device, they could bypass biometric security. A strong password protects your accounts, even if your device is compromised.

“Apple is asking me to update the software on my iPhone AGAIN. Is this really necessary?” — Karen O.

You’re being asked to update your software because of a Zero Day—a serious cybersecurity threat that was unknown until it started affecting devices. The update (in this case, iOS 18.3.1) fixes the issue. The same applies to Android devices. If you’re busy, you may have the option to schedule the update overnight. However, if the threat is severe, the update may be required immediately without an option to delay.

“What’s the make and model of my first car? Ha ha ha!” — DeJessica

Actually, Jessica, if you posted something about your first car on Facebook…and then used it as an answer to your security question on a website, I can use that information to log in as you and do whatever I want.  

Send us your cybersecurity question for possible use in a future newsletter.

Cyber cartoon © 2025 Cartoonstock | Original content © 2025 Aware Force LLC