Friday, June 14, 2024

Google to Auto-turn on 2-Factor Authentication For 150 Million Users by Default

Google has announced recently that they are currently intending to auto-enroll 150 million users in the company`s “two-step verification” system by default and they are planning to do it by the end of this year. 

The main motive of planning this is to stop all unauthorized access to accounts and at the same time to increase security protection. While Google is also aiming to ask 2 million YouTube authors to switch on the setting that is known as 2-step verification (2SV).

Composing Password Sign-in Seamless and Safe

Google has a strong password manager, which has been built straight into Chrome, Android, and the Google App, not only this but it also uses the most advanced security technology that always keeps the users’ passwords safe and secure.

However, with the help of Google manager users can create a strong and reliable password. And the Google app enables the users to access all of the passwords that were being saved in Google Password Manager right from the Google app menu.

Making people enrolled in 2SV

Having 2-step verification doesn’t mean that it will perfectly protect you, what it means, it generally decreases the attack rate of cybercriminals. As 2SV has always been the heart of Google’s different security practices.

Therefore Google has decided to make it seamless for all the users with a Google prompt, that generally needs a simple click on your smartphone device to signify that it’s really you attempting to sign in.

Adding security keys into devices and sign-in enhancements

Google has started the invention of security keys, as it is another form of authentication which needed the users to click the key during questionable sign-in attempts.

Moreover, with Google Identity Services, the experts of Google have combined its advanced security along with easy sign-in to present a comfortable experience that tries to keep users safe. 

All these new services were mainly done for future authentication and guard the system from vulnerabilities like click-jacking, pixel tracking, and many other webs and app-based threats.

Currently, Google is mainly focusing on auto-enrolling Google accounts as it has the conventional backup mechanisms in position to make it quite a seamless transition to 2SV. 

But, all the iOS device owners can simply use Chrome to autofill saved passwords in their different apps, and not only this but Google has declared that very soon they will be able to use Chrome`s password generation tool for any type of iOS app.

Google always thinks of better options for their users, that’s why doing all this will help them to stay safe and secure from unwanted threat attacks that harm the users as well as Google in many ways.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates.


Latest articles

Sleepy Pickle Exploit Let Attackers Exploit ML Models And Attack End-Users

Hackers are targeting, attacking, and exploiting ML models. They want to hack into these...

SolarWinds Serv-U Vulnerability Let Attackers Access sensitive files

SolarWinds released a security advisory for addressing a Directory Traversal vulnerability which allows a...

Smishing Triad Hackers Attacking Online Banking, E-Commerce AND Payment Systems Customers

Hackers often attack online banking platforms, e-commerce portals, and payment systems for illicit purposes.Resecurity...

Threat Actor Claiming Leak Of 5 Million Ecuador’s Citizen Database

A threat actor has claimed responsibility for leaking the personal data of 5 million...

Ascension Hack Caused By an Employee Who Downloaded a Malicious File

Ascension, a leading healthcare provider, has made significant strides in its investigation and recovery...

AWS Announced Malware Detection Tool For S3 Buckets

Amazon Web Services (AWS) has announced the general availability of Amazon GuardDuty Malware Protection...

Hackers Exploiting MS Office Editor Vulnerability to Deploy Keylogger

Researchers have identified a sophisticated cyberattack orchestrated by the notorious Kimsuky threat group.The...
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Free Webinar

API Vulnerability Scanning

71% of the internet traffic comes from APIs so APIs have become soft targets for hackers.Securing APIs is a simple workflow provided you find API specific vulnerabilities and protect them.In the upcoming webinar, join Vivek Gopalan, VP of Products at Indusface as he takes you through the fundamentals of API vulnerability scanning..
Key takeaways include:

  • Scan API endpoints for OWASP API Top 10 vulnerabilities
  • Perform API penetration testing for business logic vulnerabilities
  • Prioritize the most critical vulnerabilities with AcuRisQ
  • Workflow automation for this entire process

Related Articles