Technology giant Google has recently revealed the method it uses to prevent phishing attacks on its employees. Google has told that its employees have been using physical U.S.B security keys instead of the traditional passwords method for authentication.
What is phishing.?
Phishing is a type of attack where the intruders disguising as trustworthy agents attempt to gain your personal information such as passwords, credit card numbers or any other information.
For example: You may receive a mail from some attackers who disguise as bank officials asking you to reset your password for your net banking account as there has been a data breach, as you go to the site and login, the attackers get your login id and passwords, thus they can now access your account.
Physical Security Keys: Physical security keys are replacements for passwords. Whenever you have to login to some account or get access you insert the usb (which acts as the key) into your system and press a button on it, that’s it, no need to remember crazy and long passwords, no OTP worries. These physical keys resemble the vehicle keys that we use.
Google revealed that the use of physical keys has made its employees safer to phishing attacks. It was revealed that there had been no phishing attacks for almost 2 years now. Physical security keys look like a promising alternative to the age-old methods of passwords. With recent attacks revealing that even your fingerprints can be cloned, these physical keys could be the future of authentication systems.
- Vishing (Voice Phishing)
- Phishing in Ethical Hacking
- Centralized vs Distributed Version Control: Which One Should We Choose?
- Why Should I Learn Coding?
- Difference between Organic Search and Paid Search
- Introduction to Git Branch
- Why Internships are Important for Engineering Students or Freshers?
- Design Patterns : A Must Skill to have for Software Developers in 2019
- Advantages of cracking GATE from Indian Perspective
- How Did Facebook Remove 2.2 Billion Fake Accounts in the First Quarter of 2019?
- 5 Must Have Tools For Web Application Penetration Testing
- 7 Tips and Tricks to Learn Programming Faster
- 5 Women Programmers Who Changed The World!
- Why Serverless Apps?
If you like GeeksforGeeks and would like to contribute, you can also write an article using contribute.geeksforgeeks.org or mail your article to email@example.com. See your article appearing on the GeeksforGeeks main page and help other Geeks.
Please Improve this article if you find anything incorrect by clicking on the "Improve Article" button below.