Friday, January 24, 2025
HomeCyber Security NewsGoogle's New Dark Web Monitoring Feature for Gmail Users

Google’s New Dark Web Monitoring Feature for Gmail Users

Published on

SIEM as a Service

Follow Us on Google News

Google declared that all Gmail users within the United States would shortly be able to utilize the dark web report security feature to determine whether their e-mail address has been found on the dark web.

Google already offers a dark web monitoring service to paid US customers through its Google One subscription service. Nonetheless, Google I/O today extended free security monitoring to all Gmail users. 

This enables Gmail users to search the dark web for their email addresses and implement security measures based on Google’s recommendations.

  • Improved data control and transparency
  • Gmail’s Dark Web Scan
  • Spam View in Google Drive
  • Effortless deletion of Maps search history
  • AI-powered Safe Browsing

“We’re expanding access to our dark web report in the next few weeks, so anyone with a Gmail account in the US will be able to run scans to see if your Gmail address appears on the dark web and receive guidance on what actions to take to protect yourself,” Google says.

Dark Web Monitoring

Additionally, Google will periodically alert Gmail users to see whether their email addresses have been connected to any data breaches resulting in darknet forum posts for cybercrime.

Subscribers to Google One can enable it by heading to Google One and selecting “Set up > Start monitoring” and “Dark web report.”

“Google One’s dark web report helps you scan the dark web for your personal info — like your name, address, email, phone number and Social Security number — and will notify you if it’s found,” said Google One Director of Product Management Esteban Kozak in March when the feature was first announced.

Google One users, according to Kozak, are also shown results for “other related info that may be found in those data breaches.”

“And if any matching info is found on the dark web, we’ll notify you and provide guidance on how you might protect that information.”

According to the company, it is possible to remove a profile from the dark web report settings or delete it and all personal information added to it from the monitoring profile.

Google also revealed today at Google I/O that it has enhanced its Safe Browsing service to recognize and block 25% more phishing attempts on Chrome and Android.

Additionally, the business has improved Google Maps’ search history deletion capability and added a new spam view to Google Drive.

Struggling to Apply The Security Patch in Your System? – 
Try All-in-One Patch Manager Plus

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Subaru’s STARLINK Connected Car’s Vulnerability Let Attackers Gain Restricted Access

In a groundbreaking discovery on November 20, 2024, cybersecurity researchers Shubham Shah and a...

Android Kiosk Tablets Vulnerability Let Attackers Control AC & Lights

A security flaw found in Android-based kiosk tablets at luxury hotels has exposed a...

CISA Releases Six ICS Advisories Details Security Issues

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued six Industrial Control Systems (ICS)...

Juniper Routers Exploited via Magic Packet Vulnerability to Deploy Custom Backdoor

A sophisticated cyber campaign dubbed "J-magic" has been discovered targeting enterprise-grade Juniper routers with...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

Android Kiosk Tablets Vulnerability Let Attackers Control AC & Lights

A security flaw found in Android-based kiosk tablets at luxury hotels has exposed a...

CISA Releases Six ICS Advisories Details Security Issues

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued six Industrial Control Systems (ICS)...

PayPal Fined $2 Million Fine For Violating Cybersecurity Regulations

The New York State Department of Financial Services (NYDFS) has imposed a $2 million...