Android will allow you to authenticate and add security to your account with the device.
From now on, users with an Android operating system, versions 7.0 and up, will be able to use their phone as an additional layer of security in their accounts. This was announced by Google on Wednesday, during the Google Next, an event on cloud technologies that takes place this week in San Francisco, USA.
The new feature, which begins to be deployed as a beta version, allows your Android phone to become a portable authentication key that adds security to your accounts. This means that your phone can serve as a second step of access verification, without the need for messages or automatic calls with a security code.
Activating the option is a way to avoid being a victim of attacks such as phishing, with which cybercriminals try to deceive users, simulate in appearance the design of a site and steal their access credentials and enter their accounts. Android authentication can be activated for personal Google accounts and also for corporate services.
According to Urs Holze, vice president of technical infrastructure at Google, the software security key simplifies the experience of advanced security and allows you to “protect accounts like never before” by reaching many more users with a simpler and more accessible second authentication factor .
How can he do it?
To activate the security key built into your phone, you will need a Smartphone with a version equal to or higher than Android 7.0, such as a Nokia 6, Samsung Galaxy Note 8, A8 or J2 pro, LG Q6, Sony Xperia L2, Motorola Z2 and Huawei P10 or Mate 9.
It will also require a computer with Chrome OS, MacOS X or Windows 10 enabled to use Bluetooth and with the Chrome browser installed.
Step by Step
- Log in to your Google account on your Android phone and activate the Bluetooth feature.
- On the computer, enter ‘navigate to your account’ and in the login options choose the two-step verification located on this link.
- Click on “Add a security key”.
- Choose your Android phone from the list of available devices.
- As part of an additional recommendation, register a backup security key in your account and keep it in a safe place, so that you can log in to your account if you lose your phone.
Posts
- Facebook is a new look .. How does Zuckerberg imagine his new platform?
- The fall of Galaxy Fold within a few hours What happened?
- Enhanced Reality .. Snape Revolution Chat in your Smartphone Camera
- Smartphone applications .. Will we see the end of the era?
- A huge market in the Dark Web in Germany
- 4 G or LTE And what is the difference between them?
- The Fifth Generation Technology That is Late To Appear
- Criticized by experts Founder of Amazon presents his vision of the invasion of space
- Xbox One Best Console?
- Google Chrome browser is it the best one?
- Android Apps on Google Play
- Virtual Reality
- Cyber attacks The need to protect against threats
- The first photo of a black hole
- Computers and cellphones forensics
- IT Training
- Your cell phone could be your password, literally
- Artificial Intelligence
- Data Recovery
- Huawei P30 y P30 Pro
- Robots helped inspire deep learning might become
- Canon Digital Cams
- Sony Technology
- Apple sells millions of iPhones
- What is the use of refrigeration in our computers?