April 17, 2019 By Shane Schick 2 min read

Smartphones running Android 7.0 and higher can now serve as two-factor authentication (2FA) tools as part of a Google 2FA strategy to boost security across its online services.

In a blog post published amid its annual Google Cloud conference in San Francisco last week, the company said turning devices into security keys is a way to help consumers and businesses avoid some of the risks around phishing schemes and other attempts by cybercriminals to steal usernames and passwords. Much like using a set of credentials in addition to a USB key, the Google 2FA approach combines something a user knows along with something they physically possess.

How to Get Started With Google 2FA

Those interested in using their Android smartphone as a security key can enroll via Google Play Services and add their account, as long as they have Bluetooth enabled on both their mobile device and their desktop.

Once this is done, anyone who receives an email, text message or anything else directing them to a bogus version of a Google-owned online service will likely realize what’s happening because the Google 2FA key won’t be required.

Google said the program is still in beta and noted that its Titan Security Key remains the best defense against phishing attacks. The company also suggested that those who choose its 2FA option ensure they have an additional backup security key in a safe place somewhere they can access if the need arises.

Looking Beyond 2FA to MFA

While Google’s smartphone-based security key may help thwart some phishing campaigns, and may be an improvement over the pairing of a password with an SMS key, it’s obviously limited to devices running Android.

Meanwhile, the growing movement of shopping, banking and other activities to online services may mean consumers and organizations need to think about additional layers of protection. IBM experts suggest that multifactor authentication can offer greater peace of mind by introducing context-based access, such as scanning a QR code, instead of entering a password at all. Biometric options such as fingerprint scanning offer another way to keep cybercriminals at bay.

More from

Evolving red teaming for AI environments

2 min read - As AI becomes more ingrained in businesses and daily life, the importance of security grows more paramount. In fact, according to the IBM Institute for Business Value, 96% of executives say adopting generative AI (GenAI) makes a security breach likely in their organization in the next three years. Whether it’s a model performing unintended actions, generating misleading or harmful responses or revealing sensitive information, in the AI era security can no longer be an afterthought to innovation.AI red teaming is emerging…

What we can learn from the best collegiate cyber defenders

3 min read - This year marked the 19th season of the National Collegiate Cyber Defense Competition (NCCDC). For those unfamiliar, CCDC is a competition that puts student teams in charge of managing IT for a fictitious company as the network is undergoing a fundamental transformation. This year the challenge involved a common scenario: a merger. Ten finalist teams were tasked with managing IT infrastructure during this migrational period and, as an added bonus, the networks were simultaneously attacked by a group of red…

A spotlight on Akira ransomware from X-Force Incident Response and Threat Intelligence

7 min read - This article was made possible thanks to contributions from Aaron Gdanski.IBM X-Force Incident Response and Threat Intelligence teams have investigated several Akira ransomware attacks since this threat actor group emerged in March 2023. This blog will share X-Force’s unique perspective on Akira gained while observing the threat actors behind this ransomware, including commands used to deploy the ransomware, active exploitation of CVE-2023-20269 and analysis of the ransomware binary.The Akira ransomware group has gained notoriety in the current cybersecurity landscape, underscored…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today