Technology

Google announces “Titan security Keys” with 2FA to combat account hijacking



Google today announced its own hardware-based security key dubbed “Titan Keys” at Google’s Cloud Next Conference. The new Google Titan Security Keys comes with two-factor authentication (2FA) which is thought to combat the most prevalent form of online account hijacking. With 2FA, the users now need to prove their physical identity to confirm that they are legitimate. In this case, the user may need to authenticate via fingerprint and their likes. Earlier, without 2FA authentication attackers used to guess or steal the password and used it to gain access to the user’s accounts.

Google Titan Security Keys with 2FA: Details

Advertisement

Google has been internally testing the device on its 85,000 users since 2017. Last week, it announced it has been able to stop the attackers from gaining access to all its user accounts. Now Google plans to translate the same success to all the users. The new Titan security keys will be available in two versions, a USB version, and the Bluetooth version. A USB version can be directly attached to the laptop or computer. The Bluetooth one has to be paired with a device before it can be used; it is mainly targeted at mobile users. Both versions have met the Fast Identity authentication standard (FIDO) that makes them compatible with other sites that Google owns.

Also Read: Self-healing tent that repairs holes and punctures itself by friction



Up to now, everything seems done and dusted. But the real challenge lies in the adoption ‘of the physical keys by the users. It was revealed in a study carried out by John Hopkins University and the University of Maryland in 2016. Out of 500 users, a paltry number of one in four seems to adopt the 2FA authentication on all devices. About 45% of the users employed the 2FA authentication in some services only. While 68% of the users have only used the 2FA authentication, as they had no choice. This indicates that users need to attribute a bit more responsibility for their security.

Source

Sekhar. M

Always on the move with the latest happenings in the field of technology and health. When I am not writing, you can find me listening to the latest chartbusters. Also being a sports geek, I always keep a close eye on all the latest happenings.

Share
Published by
Sekhar. M

Recent Posts

78cm Modular Electric Car iEV Z Changes Size as per the Need

iEV motors from Denmark has manufactured a pod-sized 78 cm iEV Z modular electric car.…

3 years ago

Updated Garena free fire redeem codes today new: How to redeem Ff rewards?

Garena free fire - Illuminate is a multiplayer battle royal mobile game. The app is…

3 years ago

Top 11 Ways to Keep Your Brain Healthy and Young

The stressors of adult life can take a serious toll on your brain and make…

3 years ago

Top Men Body Hair Removal Methods-2021

Men often experience a lot of irritation and embarrassment due to the unwanted growth of…

3 years ago

Microservices vs Monolithic architecture, Which is right for your Business?

Web application architecture describes the relationship between servers, databases and applications. All web applications are…

4 years ago

How Mobile Apps are Revolutionizing The Media And Entertainment Industry

Gone are the days when mobile phones come in handy only for voice calling and…

4 years ago