Tuesday, October 20, 2020

Google warn users of a vulnerability with ‘Titan Security Key’

Featured

GIP releases inaugural annual report at second plenary meeting

The Second Plenary Meeting of the Green Investment Principles for the Belt and Road (GIP) was held today in...

Pakistan re-elected as member UNHRC

Pakistan has been re-elected to the United Nations Human Rights Council (HRC) with an overwhelming majority securing 169 votes...

Indonesia to host Trade Expo Indonesia 2020 Virtually

The Government of Indonesia is once again hosting its biggest annual international business exhibition, the Trade Expo Indonesia (TEI)...
Zubair Yaqoob
Zubair Yaqoob
The author has diversified experience in investigative journalism. He is Chief content editor at wnobserver.com He can be reached at: [email protected]

A recent report from the website CNET , that the key to safety the Google contains a security error, as the company issued a warning about Titan Security Key, special version bluetooth of the device.

The key contains a security error on how it is connected to a device via Bluetooth, how to authenticate this pairing, and the next attacker can rename any Bluetooth device as Titan Security Key, the user commit to connect to this phishing device.

Google warned that once the victim’s device was connected via Bluetooth, hackers would be able to take action on the device, as Google noted another attack scenario, where a nearby attacker can connect to a security key Bluetooth Of the person before the real owner.

In this case, if the attacker already knows the login credentials, the account will be accessible.

Google security key

Google recommended unlocking the key Bluetooth and asked to replace it, the company warned you that if you use the pairing feature Bluetooth for the security key, you must make sure that you are in a special location where a potential attacker can not reach a distance of 30 feet.

Security keys are generally an effective way to prevent account hijacking, but Google’s latest release provides examples of how hackers continue to find ways to hack around them.

Christian Brand, product manager Google Cloud said in the company’s publication on this error: “It is safer to use the affected key instead of having no key at all, because the security keys are the strongest protection against the deception that is currently present.”

Zubair Yaqoob
Zubair Yaqoob
The author has diversified experience in investigative journalism. He is Chief content editor at wnobserver.com He can be reached at: [email protected]

Latest News

GIP releases inaugural annual report at second plenary meeting

The Second Plenary Meeting of the Green Investment Principles for the Belt and Road (GIP) was held today in...

Pakistan re-elected as member UNHRC

Pakistan has been re-elected to the United Nations Human Rights Council (HRC) with an overwhelming majority securing 169 votes in the 193-member UN General...

Indonesia to host Trade Expo Indonesia 2020 Virtually

The Government of Indonesia is once again hosting its biggest annual international business exhibition, the Trade Expo Indonesia (TEI) on 10 – 16 November...

The World Health Organization warns countries not to be complacent in measures to prevent Corona

The Executive Director of the World Health Organization's emergency program, Dr.Mike Ryan, has warned all countries of the world against negligence in following the...

South Korea records 102 new cases of coronavirus

South Korea's Quarantine Command Center said today, Tuesday, that the total number of people infected with Covid-19 rose to 24,805, an increase of 102...

Related News