Skip to main content

Google new security planning

Google's login will no longer be easy
cyber attacks and hacking incidents, the world's largest technical company, Google is planning to give more security to its users. In order to make user accounts more secure, Google is now going to launch a two-step authentication security feature.
According to the report of Boolmerg, Google's maternal organization Alphabet Inc. is launching a security program called the Endured Protection Program. The purpose of this program is to block third party access in Google Drive and email.
For this security program, Google may also make the use of a physical USB Security Key as possible, which will be part of this security suite.

It is expected that this security program should be made for corporate executives, politicians and celebrities, because such people are most likely to have cyberattacks. This program will protect the email and data by day.
Significantly, the latest cyber attack was on Hillary Clinton's election campaign chief John Podesta in 2016. In this hackers hacked Podster's more than 60,000 emails to the public.
According to Bloomberg, Google currently refuses to respond to this new security program.
It is being said that Google's two-level verification tool will include a user's phone number with a password. This phone number will be sent to the user for verification code.

Comments

Popular posts from this blog

How to Secure Your Wireless (Wi-Fi) Home Network

How to Secure Your Wireless (Wi-Fi) Home Network Wireless Networking (Wi-Fi) has made it so easy for anyone to use Internet on your computer, mobile phones, tablets and other wireless devices anywhere in the house without the clutter of cables . With traditional wired networks, it is extremely difficult for someone to steal your bandwidth but the big problem with wireless signals is that others can access the Internet using your broadband connection even while they are in a neighboring building or sitting in a car that’s parked outside your apartment. This practice, also known as piggybacking, is bad for three reasons: It will increase your monthly Internet bill especially when you have to pay per byte of data transfer. It will decrease your Internet access speed since you are now sharing the same internet connection with other users. It can create a security hazard* as others may hack your computers and access your personal files through your own wireless network. [*...

How to secure gmail account

A recent information was provided by mail service provider Yahoo, which surprised and impressed many people. Yahoo said that about 3 billion users of Yahoo! accounts were hacked in 2013. People's passwords, personal information and other data had reached hackers, which did not even have information about users. Yahoo has described it as the Internet's biggest hacking. At the moment, Yahoo is on the verge of ending, and in 2016 it was purchased by VariJion Communications. Well it was a matter of Yahoo, but at the moment most users of Gmail use Gmail. If you also use Google Mail, you can tell that hackers are trying to hack more users' Gmail account than hacking social networking accounts these days. Your entire online information is attached to Gmail, through which hackers can steal all information about you and misuse them. In this case, you have no choice but to increase the security of your Gmail account. Follow these steps to protect your Gmail account from h...

How To Lock Aadhaar Card

While creating the Aadhar card, the government stores fingerprints and retina scan data, which is called biometric data. It is used for base verification. You can lock this biometric data sitting at home. Visit the UIDAI website and Lock / Unlock Biometrics? Click on You will now have the option of Lock your Biometrics. Insert your 12-digit base number below it and send the OTP. After this there will be a one time password on your mobile. After that open the OTP in the OTP bar of the open page and click on Verify. Now check enabled biometric locking. After checking enabled biometric locking, click on the enable. If you want to disable the lock, then uncheck the enabled biometric locking. Disable it again. In this way you can lock / unlock your base biometric data. Explain that after locking the biometric data, the transaction based on the basis and request will be validated only through OTP sent to the mobile number. The thumb and iris scan facility will end.