Google reveals 5-year roadmap detailing stronger account authentication


In five years, your Google accounts will be way more secure than they are today. The company recently revealed a five-year roadmap detailing stronger, more complex authentication methods that’ll make it harder to gain unauthorized entry into your accounts.

google-5-year-security-roadmap-3To start with, Google plans to make signing in to your account a lot more complex. Possibilities include having to pinpoint your location on a map, keying in one-time passwords generated by phone apps, using specialized hardware such as a card with NFC or a USB drive, or using an online portal that asks you to perform a set of tasks. 

“We will change sign-in to a once-per-device action and make it higher friction, not lower friction, for all users,” Google group product manager for identity, Eric Sachs, told ZDNet.”We don’t mind making it painful for users to sign into their device if they only have to do it once.”

Google will also eventually switch on two-step authentication by default to add another layer of security on top of the log-in process. 

The company released a similar plan back in 2008, but Google has had to rethink everything on account of smartphones becoming so advanced and popular. Sachs admitted Google didn’t see the high rate of smartphone adoption coming, hence the new roadmap. In addition to a more stringent login process on your main device, Google also has plans to make accessing your accounts on a second device more intricate. You’ll most likely need your first phone or tablet on hand to authenticate your second one via NFC or a similar technology.

These are but a few of the things Google hopes to accomplish within five years in an effort to combat increasingly more frequent security breaches. To read the full roadmap, check out the lengthy document the company has published. 


These are the worst passwords of 2018. Is yours on this list?

Do you use a bad password that makes your online accounts easy to break into? SplashData has compiled a list of the top 100 worst passwords for 2018 and there are quite a few listings that were carryovers from prior lists.

Hertz speeds up car rentals with biometric scan technology

Biometric security technology that uses face, fingerprint, and voice recognition is gaining traction, with Hertz emerging as the latest company to incorporate it into its daily operations.
Smart Home

Ring Alarm vs. Nest Secure: Which one is right for you?

Thanks to the advance of technology, it's become really easy nowadays to secure your home and protect it from thieves, intruders, and unwanted guests. Which one of these two top contenders is right for you?

Google+ continues to sink with a second massive data breach. Abandon ship now

Google+ was scheduled to shut its doors in August 2019, but the second security breach in only a few months has caused the company to move its plan forward a few months. It might be a good idea to delete your account sooner than later.

How to connect AirPods to your MacBook

If you have new AirPods, you may be looking forward to pairing them with your MacBook. Our guide will show you exactly how to connect AirPods to MacBook, what to do if they are already paired with a device, and more.

Hitting ‘Check for updates’ in Windows 10 opts you into beta releases

Users who are careful about keeping their system updated should watch out -- Microsoft revealed this week that clicking the Check for updates button in Windows can opt you in to testing beta code.
Emerging Tech

Awesome Tech You Can’t Buy Yet: Booze-filled ski poles and crypto piggy banks

Check out our roundup of the best new crowdfunding projects and product announcements that hit the web this week. You may not be able to buy this stuff yet, but it sure is fun to gawk!
Product Review

The Asus ZenBook 14 is a tiny notebook that gets lost in the crowd

The ZenBook 14 aims to be the smallest 14-inch notebook around, and it succeeds thanks to some tiny bezels. Performance and battery life are good, but the notebook lacks a standout feature other than size.

Secure your Excel documents with a password by following these quick steps

Excel documents are used by people and businesses all over the world. Given how often they contain sensitive information, it makes sense to keep them from the wrong eyes. Thankfully, it's easy to secure them with a password.

Which Macs are compatible with MacOS Mojave?

Is your computer ready for Apple's big Mojave update? Here's what you need to know about MacOS Mojave compatibility, what Macs can successful download Mojave, and the requirements you need to know about.

Change your mouse cursor in Windows with these quick tips

The standard mouse cursor is boring, so change it! With this guide on how to change your mouse cursor in Windows, you can choose to use one of Microsoft's pre-installed cursors or download something a bit more extravagant.

The DualShock 4 is one of the best controllers ever, and you can use it with a PC

Sony's new DualShock 4 controller has become a fan favorite, and some people want to use it with a PC. Here's how to connect your DualShock 4 and start using it, either with an official adapter, or unofficial software.

MacBook Pro battery replacement: Everything you need to know

Looking for a new battery for your MacBook Pro? It's important you know what to look for, what model you have, and what options Apple gives you! We'll cover everything you need to know about Apple MacBook Pro battery replacement.

Lost your router? Here's how to find its IP address to help track it down

Changing the login information for your router isn't always easy, that's why so many have that little card on the back. But in order to use it, you need to know where to go. Here's how to find the IP address of your router.