Tuesday, November 12, 2024
HomeGoogleGoogle to Auto-turn on 2-Factor Authentication For 150 Million Users by Default

Google to Auto-turn on 2-Factor Authentication For 150 Million Users by Default

Published on

Malware protection

Google has announced recently that they are currently intending to auto-enroll 150 million users in the company`s “two-step verification” system by default and they are planning to do it by the end of this year. 

The main motive of planning this is to stop all unauthorized access to accounts and at the same time to increase security protection. While Google is also aiming to ask 2 million YouTube authors to switch on the setting that is known as 2-step verification (2SV).

Composing Password Sign-in Seamless and Safe

Google has a strong password manager, which has been built straight into Chrome, Android, and the Google App, not only this but it also uses the most advanced security technology that always keeps the users’ passwords safe and secure.

- Advertisement - SIEM as a Service

However, with the help of Google manager users can create a strong and reliable password. And the Google app enables the users to access all of the passwords that were being saved in Google Password Manager right from the Google app menu.

Making people enrolled in 2SV

Having 2-step verification doesn’t mean that it will perfectly protect you, what it means, it generally decreases the attack rate of cybercriminals. As 2SV has always been the heart of Google’s different security practices.

Therefore Google has decided to make it seamless for all the users with a Google prompt, that generally needs a simple click on your smartphone device to signify that it’s really you attempting to sign in.

Adding security keys into devices and sign-in enhancements

Google has started the invention of security keys, as it is another form of authentication which needed the users to click the key during questionable sign-in attempts.

Moreover, with Google Identity Services, the experts of Google have combined its advanced security along with easy sign-in to present a comfortable experience that tries to keep users safe. 

All these new services were mainly done for future authentication and guard the system from vulnerabilities like click-jacking, pixel tracking, and many other webs and app-based threats.

Currently, Google is mainly focusing on auto-enrolling Google accounts as it has the conventional backup mechanisms in position to make it quite a seamless transition to 2SV. 

But, all the iOS device owners can simply use Chrome to autofill saved passwords in their different apps, and not only this but Google has declared that very soon they will be able to use Chrome`s password generation tool for any type of iOS app.

Google always thinks of better options for their users, that’s why doing all this will help them to stay safe and secure from unwanted threat attacks that harm the users as well as Google in many ways.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

10 Best DNS Management Tools – 2025

Best DNS Management Tools play a crucial role in efficiently managing domain names and...

Sweet Security Announces Availability of its Cloud Native Detection & Response Platform on the AWS Marketplace

Customers can now easily integrate Sweet’s runtime detection and response platform into their AWS...

Researchers Detailed Credential Abuse Cycle

Cybercriminals exploit leaked credentials, obtained through various means, to compromise systems and data, enabling...

New Android Malware SpyAgent Taking Screenshots Of User’s Devices

SpyAgent, a newly discovered Android malware, leverages OCR technology to extract cryptocurrency recovery phrases...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Google Patches High-Severity Vulnerabilities in Chrome

Google has released a new update for its Chrome browser, addressing two high-severity vulnerabilities....

ClickFix Exploits GMeet & Zoom Pages to Deliver Sophisticated Malware

A new tactic, "ClickFix," has emerged. It exploits fake Google Meet and Zoom pages...

Google Patched 40 Security Vulnerabilities Along With Two Zero-Days

Google has released a batch of security updates addressing 40 vulnerabilities, two of which...