Sunday, May 25, 2025
HomeSecurity NewsGoogle Offers Physical USB Security Key for High Profile Gmail and Google...

Google Offers Physical USB Security Key for High Profile Gmail and Google Drive Users

Published on

SIEM as a Service

Follow Us on Google News

Google will soon be offering an Advanced Protection by Providing Physical USB Security Key to high-profile executives an upgrade from the standard protections on Gmail and Google Drive.

Google’s Advanced Protection Program, will provide physical USB security keys that add protection beyond two-step verification to account.Also, restrict the third-party apps and services that can connect to a Google account.

Also Read:  Google using machine learning to block 99.9% of Malware and Phishing Mails

- Advertisement - Google News

Bloomberg says This will be marketed to “corporate executives, politicians, and others with heightened security concerns”.cyberattacks are targeting innocents, Hacks involve by email (phishing attack) with executives downloading malware attachments that spread throughout their contacts.

Physical USB Security Key

Two-Factor Physical Key Authentication

Few Months Before Google using Machine learning to block 99.9% of Malware and Phishing Mails

The Gmail messages of John Podesta, Hillary Clinton’s 2016 campaign chairman, were hacked last year, along with the databases of the Democratic National Committee.

The Alphabet Inc. company next month will begin offering a service called the Advanced Protection Program that places a collection of features onto accounts such as email, including a block on third-party applications from accessing data.

Physical USB Security Key

Physical USB security keys more secure because an attacker needs physical possession of the key to access an account.The USB key also cryptographically verifies the user is on a legitimate Google site and not a phishing site.

When plugged into computers, the key lets users create more robust security measures for accounts on Gmail and other Google sites. The new service will continue to require a physical USB key in addition to a second physical key for greater protection.Bloomberg said.

Google Working longtime for this and to The service appears to be aimed at raising defenses against sophisticated phishing attacks of the type that led to the Gmail hack.

Google has sent warnings to users when they are potential targets of state-sponsored attacks. The company wrote a blog post on the topic earlier this year after a number of reporters received the warning.

Latest articles

Zero-Trust Policy Bypass Enables Exploitation of Vulnerabilities and Manipulation of NHI Secrets

A new project has exposed a critical attack vector that exploits protocol vulnerabilities to...

Threat Actor Sells Burger King Backup System RCE Vulnerability for $4,000

A threat actor known as #LongNight has reportedly put up for sale remote code...

Chinese Nexus Hackers Exploit Ivanti Endpoint Manager Mobile Vulnerability

Ivanti disclosed two critical vulnerabilities, identified as CVE-2025-4427 and CVE-2025-4428, affecting Ivanti Endpoint Manager...

Hackers Target macOS Users with Fake Ledger Apps to Deploy Malware

Hackers are increasingly targeting macOS users with malicious clones of Ledger Live, the popular...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Phishing Campaign Uses Blob URLs to Bypass Email Security and Avoid Detection

Cybersecurity researchers at Cofense Intelligence have identified a sophisticated phishing tactic leveraging Blob URIs...

UK Government to Shift Away from Passwords in New Security Move

UK government has unveiled plans to implement passkey technology across its digital services later...

New Spam Campaign Leverages Remote Monitoring Tools to Exploit Organizations

A sophisticated spam campaign targeting Portuguese-speaking users in Brazil has been uncovered by Cisco...