April 17, 2019 By Shane Schick 2 min read

Smartphones running Android 7.0 and higher can now serve as two-factor authentication (2FA) tools as part of a Google 2FA strategy to boost security across its online services.

In a blog post published amid its annual Google Cloud conference in San Francisco last week, the company said turning devices into security keys is a way to help consumers and businesses avoid some of the risks around phishing schemes and other attempts by cybercriminals to steal usernames and passwords. Much like using a set of credentials in addition to a USB key, the Google 2FA approach combines something a user knows along with something they physically possess.

How to Get Started With Google 2FA

Those interested in using their Android smartphone as a security key can enroll via Google Play Services and add their account, as long as they have Bluetooth enabled on both their mobile device and their desktop.

Once this is done, anyone who receives an email, text message or anything else directing them to a bogus version of a Google-owned online service will likely realize what’s happening because the Google 2FA key won’t be required.

Google said the program is still in beta and noted that its Titan Security Key remains the best defense against phishing attacks. The company also suggested that those who choose its 2FA option ensure they have an additional backup security key in a safe place somewhere they can access if the need arises.

Looking Beyond 2FA to MFA

While Google’s smartphone-based security key may help thwart some phishing campaigns, and may be an improvement over the pairing of a password with an SMS key, it’s obviously limited to devices running Android.

Meanwhile, the growing movement of shopping, banking and other activities to online services may mean consumers and organizations need to think about additional layers of protection. IBM experts suggest that multifactor authentication can offer greater peace of mind by introducing context-based access, such as scanning a QR code, instead of entering a password at all. Biometric options such as fingerprint scanning offer another way to keep cybercriminals at bay.

More from

Cloud Threat Landscape Report: AI-generated attacks low for the cloud

2 min read - For the last couple of years, a lot of attention has been placed on the evolutionary state of artificial intelligence (AI) technology and its impact on cybersecurity. In many industries, the risks associated with AI-generated attacks are still present and concerning, especially with the global average of data breach costs increasing by 10% from last year.However, according to the most recent Cloud Threat Landscape Report released by IBM’s X-Force team, the near-term threat of an AI-generated attack targeting cloud computing…

Testing the limits of generative AI: How red teaming exposes vulnerabilities in AI models

4 min read - With generative artificial intelligence (gen AI) on the frontlines of information security, red teams play an essential role in identifying vulnerabilities that others can overlook.With the average cost of a data breach reaching an all-time high of $4.88 million in 2024, businesses need to know exactly where their vulnerabilities lie. Given the remarkable pace at which they’re adopting gen AI, there’s a good chance that some of those vulnerabilities lie in AI models themselves — or the data used to…

FBI, CISA issue warning for cross Apple-Android texting

3 min read - CISA and the FBI recently released a joint statement that the People's Republic of China (PRC) is targeting commercial telecommunications infrastructure as part of a significant cyber espionage campaign. As a result, the agencies released a joint guide, Enhanced Visibility and Hardening Guidance for Communications Infrastructure, with best practices organizations and agencies should adopt to protect against this espionage threat. According to the statement, PRC-affiliated actors compromised networks at multiple telecommunication companies. They stole customer call records data as well…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today