Friday, June 14, 2024

Google Authenticator Major Update Brings Cloud Backup Feature

Google Authenticator was launched in 2010, which provides additional security for various applications by providing authentication codes for every sign-in.

This prevents attackers from account takeover on any application linked with Google Authenticator.

Google has launched various authentication mechanisms like Google Password Manager, Sign in with Google, Google Authenticator, One-tap sign-in to Google account, etc.

Google Authenticator

Google has also been working on simplifying the process of secure sign-in.

Though Google Authenticator can provide better protection and advantage to security, it still has a great drawback.

If a user loses the device in which this Google authenticator is installed, they face an account lockout as they cannot log in without the authentication codes.

However, Google has now released a new feature in Google authenticator that will help overcome the problem of devices lost/stolen.

This new update on Google authenticator has the option to backup codes to users’ Google accounts as a safety mechanism. This update is now available for both Android and iOS platforms.

With this update we’re rolling out a solution to this problem, making one-time codes more durable by storing them safely in users’ Google Account. This change means users are better protected from the lockout and that services can rely on users retaining access, increasing both convenience and security.” reads the post from Google.

Google also stated they have been working on a “passwordless future.” Google has partnered with the FIDO alliance for a convenient and secure authentication offering like “passkeys.”

Users must update their Google authenticator application on their devices to use this feature.

Building Your Malware Defense Strategy – Download Free E-Book

Website

Latest articles

Sleepy Pickle Exploit Let Attackers Exploit ML Models And Attack End-Users

Hackers are targeting, attacking, and exploiting ML models. They want to hack into these...

SolarWinds Serv-U Vulnerability Let Attackers Access sensitive files

SolarWinds released a security advisory for addressing a Directory Traversal vulnerability which allows a...

Smishing Triad Hackers Attacking Online Banking, E-Commerce AND Payment Systems Customers

Hackers often attack online banking platforms, e-commerce portals, and payment systems for illicit purposes.Resecurity...

Threat Actor Claiming Leak Of 5 Million Ecuador’s Citizen Database

A threat actor has claimed responsibility for leaking the personal data of 5 million...

Ascension Hack Caused By an Employee Who Downloaded a Malicious File

Ascension, a leading healthcare provider, has made significant strides in its investigation and recovery...

AWS Announced Malware Detection Tool For S3 Buckets

Amazon Web Services (AWS) has announced the general availability of Amazon GuardDuty Malware Protection...

Hackers Exploiting MS Office Editor Vulnerability to Deploy Keylogger

Researchers have identified a sophisticated cyberattack orchestrated by the notorious Kimsuky threat group.The...

Free Webinar

API Vulnerability Scanning

71% of the internet traffic comes from APIs so APIs have become soft targets for hackers.Securing APIs is a simple workflow provided you find API specific vulnerabilities and protect them.In the upcoming webinar, join Vivek Gopalan, VP of Products at Indusface as he takes you through the fundamentals of API vulnerability scanning..
Key takeaways include:

  • Scan API endpoints for OWASP API Top 10 vulnerabilities
  • Perform API penetration testing for business logic vulnerabilities
  • Prioritize the most critical vulnerabilities with AcuRisQ
  • Workflow automation for this entire process

Related Articles