Friday, December 20, 2024
HomeGoogleGoogle to Auto-turn on 2-Factor Authentication For 150 Million Users by Default

Google to Auto-turn on 2-Factor Authentication For 150 Million Users by Default

Published on

SIEM as a Service

Google has announced recently that they are currently intending to auto-enroll 150 million users in the company`s “two-step verification” system by default and they are planning to do it by the end of this year. 

The main motive of planning this is to stop all unauthorized access to accounts and at the same time to increase security protection. While Google is also aiming to ask 2 million YouTube authors to switch on the setting that is known as 2-step verification (2SV).

Composing Password Sign-in Seamless and Safe

Google has a strong password manager, which has been built straight into Chrome, Android, and the Google App, not only this but it also uses the most advanced security technology that always keeps the users’ passwords safe and secure.

- Advertisement - SIEM as a Service

However, with the help of Google manager users can create a strong and reliable password. And the Google app enables the users to access all of the passwords that were being saved in Google Password Manager right from the Google app menu.

Making people enrolled in 2SV

Having 2-step verification doesn’t mean that it will perfectly protect you, what it means, it generally decreases the attack rate of cybercriminals. As 2SV has always been the heart of Google’s different security practices.

Therefore Google has decided to make it seamless for all the users with a Google prompt, that generally needs a simple click on your smartphone device to signify that it’s really you attempting to sign in.

Adding security keys into devices and sign-in enhancements

Google has started the invention of security keys, as it is another form of authentication which needed the users to click the key during questionable sign-in attempts.

Moreover, with Google Identity Services, the experts of Google have combined its advanced security along with easy sign-in to present a comfortable experience that tries to keep users safe. 

All these new services were mainly done for future authentication and guard the system from vulnerabilities like click-jacking, pixel tracking, and many other webs and app-based threats.

Currently, Google is mainly focusing on auto-enrolling Google accounts as it has the conventional backup mechanisms in position to make it quite a seamless transition to 2SV. 

But, all the iOS device owners can simply use Chrome to autofill saved passwords in their different apps, and not only this but Google has declared that very soon they will be able to use Chrome`s password generation tool for any type of iOS app.

Google always thinks of better options for their users, that’s why doing all this will help them to stay safe and secure from unwanted threat attacks that harm the users as well as Google in many ways.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Threat Actors Selling Nunu Stealer On Hacker Forums

A new malware variant called Nunu Stealer is making headlines after being advertised on underground hacker...

Siemens UMC Vulnerability Allows Arbitrary Remote Code Execution

A critical vulnerability has been identified in Siemens' User Management Component (UMC), which could...

Foxit PDF Editor Vulnerabilities Allows Remote Code Execution

Foxit Software has issued critical security updates for its widely used PDF solutions, Foxit...

Windows 11 Privilege Escalation Vulnerability Lets Attackers Execute Code to Gain Access

Microsoft has swiftly addressed a critical security vulnerability affecting Windows 11 (version 23H2), which...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

Cybercriminals Exploit Google Calendar and Drawings in Phishing Campaigns

Attackers are ingeniously exploiting Google Calendar and Google Drawings in phishing campaigns, targeting unsuspecting...

Google Announces Vanir, A Open-Source Security Patch Validation Tool

Google has officially launched Vanir, an open-source security patch validation tool designed to streamline and...

Google Chrome Security Update, Patch for High-severity Vulnerability

Google has released a significant security update for its Chrome browser, aiming to address...