Google boosts log-in protection for its users

By offering two-step verification, Google tries to cut down on account hijacking from stolen passwords

Google will offer its hundreds of millions of users the option of adding a second verification step when signing into their accounts, to complement the existing password-only authentication mechanism.

Users who choose to add this second step to their Google log-in process would reduce the likelihood of having their accounts hijacked if their password is stolen.

Google will begin to roll out the option for two-step verification on Thursday, and it will take a few days for it to be available to all users.

Google estimates that activating this feature could take up to 15 minutes. Once set up, it inevitably makes the log-in process longer, because in addition to the password, users will have to also enter a one-time code.

Users get the option of having Google generate the code and send it to them via a phone call or a text message. Or they can opt to generate the code themselves using a mobile application for Android, BlackBerry and iPhone devices.

Users can also tell Google to keep them logged in for 30 days, during which time they will not have to go through the two-step verification and log-in process.

Passwords are vulnerable in a variety of ways. Malicious hackers can sniff them over unprotected Wi-Fi networks, or trick users into revealing them through phishing scams. Malware can also capture and transmit log-in data.

Compounding the problem is the common practice of using the same password for multiple online services, opening themselves up for a broad hijacking of accounts.

Even if a password is specific to, in this case, a Google account, it holds the key to multiple Google services, including Gmail, Docs, Picasa and many others that contain personal and likely sensitive information that can be used for identity theft and financial fraud.

Google introduced two-step verification in September for Google Apps, a hosted collaboration and communication suite designed for use in organizations, like businesses and academic institutions.

Join the newsletter!

Error: Please check your email address.
Rocket to Success - Your 10 Tips for Smarter ERP System Selection

Tags Internet-based applications and servicesGooglesecurityMailAccess control and authenticationinternet

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Juan Carlos Perez

IDG News Service
Show Comments

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Ben Ramsden

Sharp PN-40TC1 Huddle Board

Brainstorming, innovation, problem solving, and negotiation have all become much more productive and valuable if people can easily collaborate in real time with minimal friction.

Sarah Ieroianni

Brother QL-820NWB Professional Label Printer

The print quality also does not disappoint, it’s clear, bold, doesn’t smudge and the text is perfectly sized.

Ratchada Dunn

Sharp PN-40TC1 Huddle Board

The Huddle Board’s built in program; Sharp Touch Viewing software allows us to easily manipulate and edit our documents (jpegs and PDFs) all at the same time on the dashboard.

George Khoury

Sharp PN-40TC1 Huddle Board

The biggest perks for me would be that it comes with easy to use and comprehensive programs that make the collaboration process a whole lot more intuitive and organic

David Coyle

Brother PocketJet PJ-773 A4 Portable Thermal Printer

I rate the printer as a 5 out of 5 stars as it has been able to fit seamlessly into my busy and mobile lifestyle.

Kurt Hegetschweiler

Brother PocketJet PJ-773 A4 Portable Thermal Printer

It’s perfect for mobile workers. Just take it out — it’s small enough to sit anywhere — turn it on, load a sheet of paper, and start printing.

Featured Content

Product Launch Showcase

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?