• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
google to add passwordless authentication support to android and chrome

Google to Add Passwordless Authentication Support to Android and Chrome

You are here: Home / General Cyber Security News / Google to Add Passwordless Authentication Support to Android and Chrome
May 5, 2022

Google these days declared plans to implement assistance for passwordless logins in Android and the Chrome web browser to allow buyers to indication in throughout various equipment and internet websites irrespective of the platform.

“This will simplify indicator-ins throughout units, internet websites, and programs no make a difference the platform – with out the will need for a solitary password,” Google reported.

Apple and Microsoft are also envisioned to extend the guidance to iOS, macOS, and Windows functioning units as well as Safari and Edge browsers.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


The new Rapidly Id On the web (FIDO) indicator-in procedure does absent with passwords totally in favor of exhibiting a prompt asking a consumer to unlock the phone when signing into a website or an software.

This is built achievable by storing a cryptographically secured FIDO credential called a passkey on the phone that’s used to log in to the online account after unlocking the device.

“As soon as you have done this, you would not need your phone once more and you can indicator-in by just unlocking your laptop,” Google stated.

“Even if you eliminate your phone, your passkeys will securely sync to your new phone from cloud backup, letting you to pick up appropriate where your aged machine still left off.”

In a way, the strategy can be seen as an extension of its individual Google prompts for logging into accounts secured with two-factor authentication (aka 2-Action Verification).

The advancement will come as code hosting system GitHub declared that it will “involve all users who contribute code on GitHub.com to empower one particular or much more sorts of two-factor authentication (2FA) by the stop of 2023” to avert account takeover attacks.

Observed this short article interesting? Follow THN on Facebook, Twitter  and LinkedIn to read far more exclusive content material we write-up.


Some parts of this report are sourced from:
thehackernews.com

Previous Post: «Cyber Security News Latest Cohort Announced for NCSC For Startups
Next Post: NIST Releases Updated Cybersecurity Guidance for Managing Supply Chain Risks nist releases updated cybersecurity guidance for managing supply chain risks»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Lazarus Group Impersonates Recruiter from Meta to Target Spanish Aerospace Firm
  • Post-Quantum Cryptography: Finally Real in Consumer Apps?
  • Microsoft’s AI-Powered Bing Chat Ads May Lead Users to Malware-Distributing Sites
  • Progress Software Releases Urgent Hotfixes for Multiple Security Flaws in WS_FTP Server
  • Cisco Warns of Vulnerability in IOS and IOS XE Software After Exploitation Attempts
  • GitHub Repositories Hit by Password-Stealing Commits Disguised as Dependabot Contributions
  • China’s BlackTech Hacking Group Exploited Routers to Target U.S. and Japanese Companies
  • The Dark Side of Browser Isolation – and the Next Generation Browser Security Technologies
  • China-Linked Budworm Targeting Middle Eastern Telco and Asian Government Agencies
  • Update Chrome Now: Google Releases Patch for Actively Exploited Zero-Day Vulnerability

Copyright © TheCyberSecurity.News, All Rights Reserved.