Google has released Titan security key for protection of accounts against breaking, reviews, comments

Google has released Titan security key for protection of accounts against breaking



The Google Company has found replacement to a standard two-stage entrance to the account in a type of a physical security key of Titan. He protects from interception of data better, than a confirmation code which usually comes by SMS or is generated through the application. The key represents the USB store which needs to be connected to the computer during authorization. For mobile devices connection through Bluetooth is used.

the Staff of Google tests new security keys since the beginning of 2017. As a result the number of breakings of their accounts was reduced to zero. Even if hackers will intercept the login and the password, they won't be able to get access to accounts without physical key. Such protection is especially important for cloudy business accounts which need to keep confidential data.

Google has released Titan security key for protection of accounts against breaking


Physical security keys not novelty. For example, already existing decision from Yubico allows to use them for an entrance to accounts of Gmail and Facebook as a part of two-stage authorization. Google has decided to emphasize advantages of this type of protection, has offered own option.

Titan Key from Google can be got in Google Store at the price of 20-25 dollars soon. USB and Bluetooth modules will cost 50 dollars. Security keys will be able to work without network and without battery that will be convenient for use in way.
Share on Facebook Share on Twitter Share on Google+
Comments / reviews:
Name:
E-Mail:
  • bowtiesmilelaughingblushsmileyrelaxedsmirk
    heart_eyeskissing_heartkissing_closed_eyesflushedrelievedsatisfiedgrin
    winkstuck_out_tongue_winking_eyestuck_out_tongue_closed_eyesgrinningkissingstuck_out_tonguesleeping
    worriedfrowninganguishedopen_mouthgrimacingconfusedhushed
    expressionlessunamusedsweat_smilesweatdisappointed_relievedwearypensive
    disappointedconfoundedfearfulcold_sweatperseverecrysob
    joyastonishedscreamtired_faceangryragetriumph
    sleepyyummasksunglassesdizzy_faceimpsmiling_imp
    neutral_faceno_mouthinnocent
Security: *
Not knows that all his search queries in Google are recorded and, moreover, if desired it is possible to get acquainted with them. And it is not only about a story of the request made from the concrete computer, and for full history of search for all mobile and not mobile devices from which the
Hackers have learned to crack with any device connected to the Internet from the computer to the car. It would seem to save important information in safety – we disconnect the device from network and we sleep peacefully. However, according to experts in the field of cyber security, it is enough
Annually hackers crack millions of bank accounts, causing damage measured by billions of dollars. Having fallen a victim of the Internet bear-hunter, it is difficult to present the amount of possible losses. Everything will depend on quantity of money on the account and information which the
In July on Twitter has appeared several messages from the account which is allegedly belonging to ISIL with threats of terrorist attack in one of the resorts of Tunisia. Information deserved the closest attention as a month before it terrorists have shot on the beach of 38 people. Perhaps,
According to the last report of the Cisco Systems company specializing in creation of systems of cyber security, on the Internet emergence of unusual "strain" of the virus extortioner under the name Samas getting into the computer without participation of the person is noted. Viruses
The Given about 1,2 billion western web accounts became available to group of the Russian hackers under the name CyberVor. Confidential logins and passwords of users have been stolen from about 420000 websites of various large and small companies. According to a source of news, the American
Hackers – the people impudent and "omnivorous". Their "production" — these are bank accounts, confidential information, accounts in social networks, e-mail, the government websites and many other things. But, it seems, they won't limit themselves to it. Recently hacker attack has been shown
The Android Mobile operating system repeatedly is found recognized the most unsafe in respect of the virus attacks. It experts research kompaniibluebox once again confirm Security Labs. Experts in safety of the Bluebox Security Labs company have found serious vulnerability in the Google
At the CES exhibition the new financial instrument from Visa under the name "Dynamics Wallet Card" is shown. He looks as the standard plastic card, with similar sizes, but in essence is the device of access to various accounts, accounts and accounts of the user. The main difference of the new
Of the Power of South Korea was announced by plans for de-anonymization of owners of bitcoins and other types of cryptocurrencies – in the near future e-wallets will force to tie them to legal bank accounts. It will partially complicate life to adventurers, but will simplify carrying out