Now generally available: Android phone’s built-in security key

Innovating for SAP customers with Google Cloud
May 7, 2019
Google’s scalable supercomputers for machine learning, Cloud TPU Pods, are now publicly available in beta
May 7, 2019
Innovating for SAP customers with Google Cloud
May 7, 2019
Google’s scalable supercomputers for machine learning, Cloud TPU Pods, are now publicly available in beta
May 7, 2019

Phishing–when an attacker tries to trick you into turning over your online credentials–is one of the most common causes of security breaches. At Google Cloud Next ’19, we enabled you to help your users defend against phishing with a security key built into their Android phone, bringing the benefits of a phishing-resistant two-factor authentication (2FA) to more than a billion users worldwide. This capability is now generally available.

While Google automatically blocks the overwhelming majority of malicious sign-in attempts (even if an attacker has a username or password), 2FA, also known as 2-Step Verification (2SV), considerably improves user security. At the same time, sophisticated attacks can skirt around some 2FA methods to compromise user accounts. We consider security keys based on FIDO standards, including Titan Security Key and Android phone’s built-in security key, to be the strongest, most phishing-resistant methods of 2FA. FIDO leverages public key cryptography to verify a user’s identity and URL of the login page, so that an attacker can’t access users’ accounts even if users are tricked into providing their username and password.

Leave a Reply

Your email address will not be published. Required fields are marked *