Wednesday, May 7, 2025
HomeSecurity NewsGoogle Offers Physical USB Security Key for High Profile Gmail and Google...

Google Offers Physical USB Security Key for High Profile Gmail and Google Drive Users

Published on

SIEM as a Service

Follow Us on Google News

Google will soon be offering an Advanced Protection by Providing Physical USB Security Key to high-profile executives an upgrade from the standard protections on Gmail and Google Drive.

Google’s Advanced Protection Program, will provide physical USB security keys that add protection beyond two-step verification to account.Also, restrict the third-party apps and services that can connect to a Google account.

Also Read:  Google using machine learning to block 99.9% of Malware and Phishing Mails

- Advertisement - Google News

Bloomberg says This will be marketed to “corporate executives, politicians, and others with heightened security concerns”.cyberattacks are targeting innocents, Hacks involve by email (phishing attack) with executives downloading malware attachments that spread throughout their contacts.

Physical USB Security Key

Two-Factor Physical Key Authentication

Few Months Before Google using Machine learning to block 99.9% of Malware and Phishing Mails

The Gmail messages of John Podesta, Hillary Clinton’s 2016 campaign chairman, were hacked last year, along with the databases of the Democratic National Committee.

The Alphabet Inc. company next month will begin offering a service called the Advanced Protection Program that places a collection of features onto accounts such as email, including a block on third-party applications from accessing data.

Physical USB Security Key

Physical USB security keys more secure because an attacker needs physical possession of the key to access an account.The USB key also cryptographically verifies the user is on a legitimate Google site and not a phishing site.

When plugged into computers, the key lets users create more robust security measures for accounts on Gmail and other Google sites. The new service will continue to require a physical USB key in addition to a second physical key for greater protection.Bloomberg said.

Google Working longtime for this and to The service appears to be aimed at raising defenses against sophisticated phishing attacks of the type that led to the Gmail hack.

Google has sent warnings to users when they are potential targets of state-sponsored attacks. The company wrote a blog post on the topic earlier this year after a number of reporters received the warning.

Latest articles

Top Ransomware Groups Target Financial Sector, 406 Incidents Revealed

Flashpoint analysts have reported that between April 2024 and April 2025, the financial sector...

Agenda Ransomware Group Enhances Tactics with SmokeLoader and NETXLOADER

The Agenda ransomware group, also known as Qilin, has been reported to intensify its...

SpyCloud Analysis Reveals 94% of Fortune 50 Companies Have Employee Data Exposed in Phishing Attacks

SpyCloud, the leading identity threat protection company, today released an analysis of nearly 6...

PoC Tool Released to Detect Servers Affected by Critical Apache Parquet Vulnerability

F5 Labs has released a new proof-of-concept (PoC) tool designed to help organizations detect...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

FBI Alerts Public to Scammers Posing as IC3 Officials in Fraud Scheme

The Federal Bureau of Investigation (FBI) has issued a warning regarding an emerging scam...

New ‘Waiting Thread Hijacking’ Malware Technique Evades Modern Security Measures

Security researchers have unveiled a new malware process injection technique dubbed "Waiting Thread Hijacking"...

EU’s GDPR Article 7 Poses New Challenges for Businesses To Secure AI-Generated Image Data

As businesses worldwide embrace digital transformation, the European Union’s General Data Protection Regulation (GDPR),...