Skip to main content

This tiny Google product could help secure your accounts

[ad_1]


You may have heard about a weird new product from Google: a little device called the Titan Security Key that will serve as a form of two-factor authentication. That means you would use the gizmo as part of a login process to verify that you are, in fact, you. Instead of getting a text message with a code, you plug the security key into your computer and press a button.



You can’t buy one of these yet (Google says it will be available to the general public “soon”), but the announcement is a good reminder that setting up two-factor authentication on your accounts is one of the easiest ways to keep your info private— even if your username and password are compromised.



“We see consistently that in a large percentage of cyber incidents, had individuals had some sort of multi-factor authentication, they would have at least delayed—or made it slightly harder—for attackers to gain access,” says Oren Falkowitz, the CEO of Area 1 Security, a firm that helps prevent phishing attacks.



In short: using two-factor authentication is smart, but a physical key isn’t your only option.



Text me?



Security experts say that receiving a code by text is the weakest of the two-factor options. Getting verification via text is pretty simple: you try to log onto an account, but first have to enter a code that’s sent to your phone. It’s easy to set up and understand—and certainly better than nothing—but the method has its flaws.



“I would say SMS is by far the worst,” says Lorrie Faith Cranor, a professor of computer science at Carnegie Mellon University and a former chief technologist with the Federal Trade Commission. “[That’s] because SMS relies on an insecure channel in the phone network that was never meant to be used for security."



Besides the fact that the channel isn’t secure, a related problem with using SMS to receive a code is “account hijacking,” Cranor says. In that case, an attacker may use a tactic like this: they’ll go to a phone store, pretend to be someone else, and have the victim’s phone number transferred to a new phone.



This could lead to unpleasant scenarios like an attacker withdrawing money from a victim’s bank account, Cranor says. “We’ve also seen it where they go to the victim’s Twitter account, and then start tweeting as them,” she adds.


Actually, don’t text me



Security experts say that there are better options than just getting that code texted to you, though. One of those is using an app like Authy, or another called Google Authenticator, to generate the six-digit number you need. Those codes expire after a set amount of time, like a self-destructing message on Mission: Impossible.



And then, of course, there’s using a gadget that you plug into your computer or connect via Bluetooth. One well-known choice is a YubiKey, and another is the forthcoming item from Google. “It’s very hard to circumvent a physical security token,” says Amine Hambaba, senior director for security at Shape Security. That’s because if a remote attacker had access to your username and password, they still would need to get their hands on a tangible object.



Google says that they’ve had success using them internally. “We have had no reported or confirmed account takeovers since implementing security keys at Google,” a company spokesperson says via email. And the Titan key doesn’t work with just Google accounts—you can also use it with other accounts that support using a security key.



Ultimately, a physical key is a strong way to secure an account, but it’s not a shield against all online threats. Having one won’t stop you from a downloading a malicious file, for example. And there are obvious drawbacks to using a physical object for authentication.



“I think it’s good for security,” says Cranor, of CMU. “But it’s not always the most convenient approach.” That’s because you have to carry it with you to actually use it, like an old-school house key. “It’s another thing to have to keep track of, and manipulate,” she adds.



Whether or not you plan on buying a Google key, it makes sense to turn on two-factor authentication on key accounts that allow it—head over to sites like Facebook and Gmail and do it now.




[ad_2]

Written By Rob Verger

Comments

Popular posts from this blog

Ice technicians are the secret stars of the Winter Olympics

[ad_1] The emphasis of this year's two-week-long Winter Olympic Games has been placed squarely on the Olympians themselves. After all, the stated purpose of the international competition is to bring together the world’s greatest athletes in a nail-biting competition across fifteen different winter sports. But before the curlers, skiers, and skaters even arrived in Pyeongchang, South Korea, the Olympians of the ice technician world were already a few weeks deep in a competition of their own. Mark Callan of the World Curling Federation and Markus Aschauer of the International Bobsleigh and Skeleton Federation both say they’re hoping to make the best ice the Winter Olympics have ever seen. To transform the barren concrete jungle of existing tracks and arenas into an ice- and snow-covered wonderland is an enormous undertaking. And it takes a keen understanding of the physics and chemistry that keeps frozen precipitation pristine. Curling Callan has been making and maintaining ic...

How to avoid the mid-movie bathroom break

[ad_1] Long movies and the urge to pee have been linked since the early days of cinema. Sixty-three years before Avengers: Endgame and its three-hour runtime, moviegoers settled in for nearly four hours of The Ten Commandments . “There will be an intermission,” director Cecil B. DeMille announced during the movie’s introduction. And audiences’ bladders were relieved. On average, movies aren’t getting longer, but they also don’t come with a predetermined bathroom break. That means when nature calls, you’ve got to either sit in growing discomfort or gamble on the best time to run to the restroom. But it doesn’t have to be this way, and for most people, setting your body to “do not disturb” is fairly simple. Go before the show The first piece of advice is also the easiest: pee before the movie starts. Generally, healthy adults urinate every 3-4 hours, so the longer a movie runs, the more urgent it becomes to reset your internal p...

Charted: Here's how much your food waste hurts the environment

[ad_1] Our species is pretty good at wasting food. Some we discard at the farm for being undersized or oddly shaped. Others we allow to decay in their shipping containers, thrown away before they even reach shelves. We leave even more foodstuffs wasting away in grocery stores, often by letting it sit there until it reaches its sell-by date. As consumers, we don’t have much control over most of the process that brings our food to the grocery store, but we do have control over how much food we personally waste. Let's face it: We’ve all found liquified lettuce in our veggie drawers. Don't fret. It's arguably impossible to consume 100 percent of the food we buy. But a healthy reminder of the effect food waste has on the environment might help us all to be more conscious of the amount of food we eat—and don't eat. Consumer food waste varies extensively depending on the area. In South and Southeast Asia, the Food and Agriculture Organization (FAO) estimates that only around ...