Risk
9/17/2010
06:44 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

Google Apps Adds Two-Step Verification

Enhanced security is now available to Google Apps enterprise customers via their mobile phones.

Google Authenticator App
(click image for larger view)
Google Authenticator App

Google on Monday plans to offer its users improved security through the introduction of a two-step login verification process.

Initially, two-step verification will be available to Google Apps Premiere, Government, and Education edition users, at no extra charge. But Google plans to make the technology available to all its users in the coming months, once the company is confident it can scale the technology to meet demand.

Google is expected to make the announcement at an enterprise conference called Atmosphere, which is being held in a hotel near Paris, France.

Two-step verification is already offered as an option by many online banks. An online banking customer can have a verification code sent to his or her mobile phone when a login attempt is initiated. In order to complete the login process successfully, the customer must supply the code sent to the mobile device in addition to a user name and password.

Starting Monday, if enabled by a Google Apps administrator, Google Apps Premiere, Government, and Education edition users have the option of receiving an SMS message or voice call on their mobile phones with a login verification code. Users of Android, Blackberry, and (soon) iPhone devices also have the option of downloading a mobile app called Google Authenticator that can generate a login verification code without the need for network access.

Google plans to open-source the code for these mobile applications to allow third parties to adapt them to specific enterprise security needs, such as integration with an existing on-premises authentication system.

Previous
1 of 2
Next
Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-8142
Published: 2014-12-20
Use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re in PHP before 5.4.36, 5.5.x before 5.5.20, and 5.6.x before 5.6.4 allows remote attackers to execute arbitrary code via a crafted unserialize call that leverages improper handling of duplicate keys w...

CVE-2013-4440
Published: 2014-12-19
Password Generator (aka Pwgen) before 2.07 generates weak non-tty passwords, which makes it easier for context-dependent attackers to guess the password via a brute-force attack.

CVE-2013-4442
Published: 2014-12-19
Password Generator (aka Pwgen) before 2.07 uses weak pseudo generated numbers when /dev/urandom is unavailable, which makes it easier for context-dependent attackers to guess the numbers.

CVE-2013-7401
Published: 2014-12-19
The parse_request function in request.c in c-icap 0.2.x allows remote attackers to cause a denial of service (crash) via a URI without a " " or "?" character in an ICAP request, as demonstrated by use of the OPTIONS method.

CVE-2014-2026
Published: 2014-12-19
Cross-site scripting (XSS) vulnerability in the search functionality in United Planet Intrexx Professional before 5.2 Online Update 0905 and 6.x before 6.0 Online Update 10 allows remote attackers to inject arbitrary web script or HTML via the request parameter.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.