Technology giant Google has recently revealed the method it uses to prevent phishing attacks on its employees. Google has told that its employees have been using physical U.S.B security keys instead of the traditional passwords method for authentication.
What is phishing.?
Phishing is a type of attack where the intruders disguising as trustworthy agents attempt to gain your personal information such as passwords, credit card numbers or any other information.
For example: You may receive a mail from some attackers who disguise as bank officials asking you to reset your password for your net banking account as there has been a data breach, as you go to the site and login, the attackers get your login id and passwords, thus they can now access your account.
Physical Security Keys: Physical security keys are replacements for passwords. Whenever you have to login to some account or get access you insert the usb (which acts as the key) into your system and press a button on it, that’s it, no need to remember crazy and long passwords, no OTP worries. These physical keys resemble the vehicle keys that we use.
Google revealed that the use of physical keys has made its employees safer to phishing attacks. It was revealed that there had been no phishing attacks for almost 2 years now. Physical security keys look like a promising alternative to the age-old methods of passwords. With recent attacks revealing that even your fingerprints can be cloned, these physical keys could be the future of authentication systems.
- How to Protect Yourself From Cyber Attacks?
- Phishing in Ethical Hacking
- Vishing (Voice Phishing)
- How to Create a Facebook Phishing Page ?
- 10 Tips To Identify Phishing Emails
- Can a Bird Eye View on Phishing Emails Reduce it Potentially?
- Top 5 Golang Frameworks in 2020
- How to Learn Python in 21 Days?
- Top 5 Cloud Platform Service Providers in 2020
- 10 Web Development and Web Design Facts That You Should Know
- 5 Online Education Etiquette That You Must Know in 2020
- GATE CS 2021 (Revised) Syllabus
- 7 Must-Have Mobile Apps to Prepare for Online Interviews
- 5 Tips to Crack Low-Level System Design Interviews
If you like GeeksforGeeks and would like to contribute, you can also write an article using contribute.geeksforgeeks.org or mail your article to firstname.lastname@example.org. See your article appearing on the GeeksforGeeks main page and help other Geeks.
Please Improve this article if you find anything incorrect by clicking on the "Improve Article" button below.