February 10, 2016 By Larry Loeb 2 min read

Google celebrated Safer Internet Day on Feb. 9 by making a practical stand against unsecured email. The company announced on its Official Gmail Blog that it was making changes to Gmail that make the use of an unsecured connection in mail explicit. And since Gmail passed 1 billion users recently, this move affects an awful lot of email.

Unsecured Email Marking

The new changes will show if a user receives email from, or sends email to, a service that does not support transport layer security (TLS) encryption. Gmail will now display a broken lock in the affected message at the top right corner.

Gmail has a long history of using TLS for encryption in transit, but if the receiving end does not use it, too, then it is not effective. According to TechCrunch, Google said last year that 57 percent of messages sent to Gmail users are encrypted, compared to 81 percent of outgoing messages from Gmail.

The Authentication Process

If a message can’t be authenticated by Google, it will display a question mark in place of the user’s photo or icon. This alerts a user that the message has a higher possibility of being of questionable origin.

However, “authentication by itself is not enough to guarantee your messages can be delivered, as spammers can also authenticate mail,” Google noted. “Similarly, the fact that a message is unauthenticated isn’t enough to classify it as spam because some senders don’t authenticate their mail or because authentication breaks in some cases (for example, when messages are sent to mailing lists).”

Google also warned that if a user receives a message from a major entity, such as a financial institution or an email provider such as Yahoo or Hotmail, and it isn’t authenticated, the message is most likely forged. That signals that one should be careful about replying to it or opening any attachments. The idea here is that phishing emails generally have certain characteristics, and not being authenticated is one of them.

Users Beware

Ultimately, this authentication is a warning but not a deal breaker when it comes to email; there can be false positives and false negatives. But adding these tools to an email system such as Gmail allows the messages that don’t play by the rules stand out. Hopefully, this adds to a user’s security awareness.

More from

Smoltalk: RCE in open source agents

26 min read - Big shoutout to Hugging Face and the smolagents team for their cooperation and quick turnaround for a fix! Introduction Recently, I have been working on a side project to automate some pentest reconnaissance with AI agents. Just after I started this project, Hugging Face announced the release of smolagents, a lightweight framework for building AI agents that implements the methodology described in the ReAct paper, emphasizing reasoning through iterative decision-making. Interestingly, smolagents enables agents to reason and act by generating…

4 ways to bring cybersecurity into your community

4 min read - It’s easy to focus on technology when talking about cybersecurity. However, the best prevention measures rely on the education of those who use technology. Organizations training their employees is the first step. But the industry needs to expand the concept of a culture of cybersecurity and take it from where it currently stands as an organizational responsibility to a global perspective.When every person who uses technology — for work, personal use and school — views cybersecurity as their responsibility, it…

How red teaming helps safeguard the infrastructure behind AI models

4 min read - Artificial intelligence (AI) is now squarely on the frontlines of information security. However, as is often the case when the pace of technological innovation is very rapid, security often ends up being a secondary consideration. This is increasingly evident from the ad-hoc nature of many implementations, where organizations lack a clear strategy for responsible AI use.Attack surfaces aren’t just expanding due to risks and vulnerabilities in AI models themselves but also in the underlying infrastructure that supports them. Many foundation…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today