Skip to main content

Google rolls out 007-style ‘two-step verification’ security

Image used with permission by copyright holder

Many of us go about our day, logging into online accounts from home, work, the library, the Apple store, and wherever else in order to read that inspirational story Mom e-mailed us about a kitten befriending a dog, and everything is hunky dory. Someone, on the other hand, is currently becoming the person you read about who had their password stolen, and their bank account hacked using the information they e-mailed themselves “that one time.” (Almost two thirds of all Americans have been affected, according to a study from Internet security giant Symantec. This type of digital information theft is easier than many of us realize.)

Security concerns have grown steadily over the last several years as users continue to put more and more private data behind the security vault door that is a Google account login. But perhaps these concerns are finally being laid to rest. Google is rolling out a new solution for those desiring additional protection that will make Google as the Alfred to your Bruce, the M to your James, the home base secret-keeper to your mobile, private data-accessing lifestyle.

You can now activate a “two-step verification,” which will will require you to login with your username and password as usual, and then, on a second page, fulfill a request for a verification code before admitting you to your account. This verification code, randomly generated by Google, is only valid for the few seconds while you are completing the login process, and provided to you upon your request. Anyone who steals your password, or even this secret code, will not be able to login to your account later and steal all of the details of your “girls night out” planned for next Thursday night.

Google is providing a variety of ways for you to obtain this temporary password. According to a beta tester at over at TechCrunch, you can request it via a new mobile app called Google Authenticator (for your Android, iPhone, or Blackberry), text Google for it, or have them company call you. You can also authenticate a second phone if you lose access to your primary one, or use a pre-printed list of one-time use passwords (which you will inevitably keep hidden in the sole of your shoe), if you need a fail-safe backup.

To ease the burden of this process for the numerous times a day you access your Google account, you can input a one-time authentication code for devices you use all the time. A little trickier is the requirement to generate and store app-specific pass-codes for programs like Apple Mail and iCal, which often automatically login to your Google account and regularly pull down new data for your preferred method of interface.

We’ve been on the old username-and-password system for some time now, but this new, second-tier authentication approach is starting to spread. You may have seen it on bank websites, with their periodic prompt of security questions, or a “call and answer” system with unique images tied to your account, so that you can verify the page you’re on before inputting your password. You may even have received a portable, random password-generating key fob for your corporate or securities-trading account. Yahoo has taken steps to protect users by helping team them up with Norton’s Internet Security product.

We can’t say your information is now invulnerable, but Google, as usual, has taken another promising step towards solving a big consumer problem. Google’s Accounts Help Center has details on how to get your own Google account set up with two-step verification.

Editors' Recommendations

Adam Milgrom
Former Digital Trends Contributor
Best VPN deals: Save on NordVPN, ExpressVPN, and Surfshark
A close-up of a computer monitor displaying a generic VPN.

There are a lot of good reasons to grab a VPN, whether it's for security and privacy purposes or whether you just want to access content that would otherwise be geo-locked. Luckily, over the past few years, the number of VPNs out there has boomed massively, and you have a huge selection of them to pick from. There's also a lot of work that's gone into creating more secure and encrypted protocols, and some VPNs even do a double-server bounce to make absolutely sure nobody can see what you are doing, which is essential if you're going to be going somewhere with privacy and security issues. Regardless of why you want to get a VPN, we've collected some of our favorite VPN deals below, so you don't have to go looking.

Best VPN Deal

Read more
Best router deals: Save on mesh networks and Wi-Fi 6 routers
The Netgear Nighthawk AXE11000 Tri-Band Wi-Fi 6E Router on a table.

Strangely enough, routers have had a huge technological bump in the last few years due to the number of devices that need to be connected to the internet. That's one of the main aspects of the new Wi-Fi 6, a standard that not only increases speeds and quality of the connection but addresses the issue with ten devices or more needing to connect to the internet constantly without impacting quality. To that end, if you haven't upgraded your router or mesh network in three to five or more years but are increasingly buying more smart-home products, grabbing a modern router with the latest technology is probably a good idea.

Best Router Deals

Read more
Intel says AMD’s Ryzen 7000 is snake oil
AMD CEO Lisa Su holding an APU chip.

In what is one of the most bizarrely aggressive pieces of marketing material I've seen, Intel is comparing AMD's Ryzen 7000 mobile chips to snake oil. Over the weekend, Intel posted its Core Truths playbook, which lays out how AMD's mobile processor naming scheme misleads customers.

There's an element of truth to that, which I'll get to in a moment, but first, the playbook. Intel starts with claiming that there's a "long history of selling half-truths to unsuspecting customers" alongside images of a snake oil salesman and a suspicious used car seller. This sets up a comparison between the Ryzen 5 7520U and the Core i5-1335U. Intel's chip is 83% faster, according to the presentation, due to the older architecture that AMD's part uses.

Read more