SlideShare a Scribd company logo
1 of 2
Download to read offline
Google endorses ‘Safe Browsing

Security is always at the back of everyone’s mind, whether it’s using internet or web
applications. Security concerns, have since long influenced the very way users, use Web.
Realising this, service providers of today’s time are constantly on alert, to ensure overall
security.
Talking about one such service provider, we have Google who regularly studies the threat
landscape and offers regular internet security updates – warnings. Lately, Google announced
that they will warn their users with security warnings for suspected state-sponsored attacks. For
users, who Google believe are being targeted, Google will flash a message on the top of the page
reading ‘Warning: We believe state-sponsored attackers may be attempting to compromise your
account or computer. Protect yourself now’.




Google also emphasizes that, if a user sees such a warning it does not necessarily mean that the
users account has been hijacked. It implies that Google believes that the user may be a target for
malware or phishing. Google also clarifies that these warnings are not being shown because
Google’s internal systems have been compromised or because of a particular attack, instead it is
only to alert for the user to be prepared for probable chances of an attack.
Taking a step further, Google also suggests few immediate steps, which can help the user secure
their accounts. These steps include:

       Creating a unique password that has a good mix of capital-lowercase letters- punctuation
       marks and numbers
       Enabling 2-step verification for additional security
       Updating the browser, operating system, plug-ins, document editors and so-on, regularly
       Look for https://accounts.google.com/ in your browser bar, while signing in to Google as
       attackers often send links through fake sign-in pages, to steal your password

Eric Grosse, VP Security Engineering, further highlights that Google’s detailed analysis along
with victim reports; strongly suggest the involvement of states or groups that are state-sponsored.
Being a leading network security provider, Cyberoam appreciates the proactiveness Google is
endorsing in terms of ensuring user Security. It is really worth applause, that Google takes steps
to notify users about attacks/ probable attacks, so that users can take the right step to protect their
privacy.

More Related Content

Similar to Google endorses safe browsing

GOOGLE ADVANCED PROTECTION PROGRAM.pptx
GOOGLE ADVANCED  PROTECTION PROGRAM.pptxGOOGLE ADVANCED  PROTECTION PROGRAM.pptx
GOOGLE ADVANCED PROTECTION PROGRAM.pptxe-Definers Technology
 
How secure is two factor authentication (2 fa)
How secure is two factor authentication (2 fa)How secure is two factor authentication (2 fa)
How secure is two factor authentication (2 fa)Jack Forbes
 
Why GO Global has never been hacked
Why GO Global has never been hackedWhy GO Global has never been hacked
Why GO Global has never been hackedRussFeron
 
The Google Hack VSeries.pdf
The Google Hack VSeries.pdfThe Google Hack VSeries.pdf
The Google Hack VSeries.pdfOsama Khalil
 
5 Steps to Secure Google Drive
5 Steps to Secure Google Drive5 Steps to Secure Google Drive
5 Steps to Secure Google DriveDatto
 
google-apps-security-and-compliance-whitepaper (1)
google-apps-security-and-compliance-whitepaper (1)google-apps-security-and-compliance-whitepaper (1)
google-apps-security-and-compliance-whitepaper (1)Mohit Sharma
 
REVIEW OF GOOGLE’S CYBER SECURITY POLICYNAMEINSTRUCTOR’S N.docx
REVIEW OF GOOGLE’S CYBER SECURITY POLICYNAMEINSTRUCTOR’S N.docxREVIEW OF GOOGLE’S CYBER SECURITY POLICYNAMEINSTRUCTOR’S N.docx
REVIEW OF GOOGLE’S CYBER SECURITY POLICYNAMEINSTRUCTOR’S N.docxjoellemurphey
 
Mobile App Security Protecting Your App from Cyber Threats.edited.docx
Mobile App Security Protecting Your App from Cyber Threats.edited.docxMobile App Security Protecting Your App from Cyber Threats.edited.docx
Mobile App Security Protecting Your App from Cyber Threats.edited.docxmadhuri871014
 
Cybersecurity - Best Practices for Small Businesses.pdf
Cybersecurity - Best Practices for Small Businesses.pdfCybersecurity - Best Practices for Small Businesses.pdf
Cybersecurity - Best Practices for Small Businesses.pdfYuriKasan
 
Application security (APP) and CRM or ERP extension solutions
Application security (APP) and CRM or ERP extension solutionsApplication security (APP) and CRM or ERP extension solutions
Application security (APP) and CRM or ERP extension solutionscharly simon
 
5 Ways to Stay #CyberSecure
5 Ways to Stay #CyberSecure5 Ways to Stay #CyberSecure
5 Ways to Stay #CyberSecureMedia Sonar
 
Viruses, Biometrics, Encryption
Viruses, Biometrics, EncryptionViruses, Biometrics, Encryption
Viruses, Biometrics, Encryptionmonroel
 
Understanding the web browser threat
Understanding the web browser threatUnderstanding the web browser threat
Understanding the web browser threatTola Odugbesan
 
5 Reasons Why Your Business Should Consider Strong Authentication!
5 Reasons Why Your Business Should Consider Strong Authentication!5 Reasons Why Your Business Should Consider Strong Authentication!
5 Reasons Why Your Business Should Consider Strong Authentication!Caroline Johnson
 
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...BlackBerry
 
Combating Cyber Crime by Priyanka Tomar @ OWASP Delhi July, 2014 Meeting
Combating Cyber Crime by Priyanka Tomar @ OWASP Delhi July, 2014 MeetingCombating Cyber Crime by Priyanka Tomar @ OWASP Delhi July, 2014 Meeting
Combating Cyber Crime by Priyanka Tomar @ OWASP Delhi July, 2014 MeetingOWASP Delhi
 
WithSecure Deepguard WhitePaper
WithSecure Deepguard WhitePaperWithSecure Deepguard WhitePaper
WithSecure Deepguard WhitePaperlincktello
 
Mobile App Security How Bahrain Development Companies Ensure Protection.edite...
Mobile App Security How Bahrain Development Companies Ensure Protection.edite...Mobile App Security How Bahrain Development Companies Ensure Protection.edite...
Mobile App Security How Bahrain Development Companies Ensure Protection.edite...madhuri871014
 
Internet transaction and communication security
Internet transaction and communication securityInternet transaction and communication security
Internet transaction and communication securityDianoesis
 

Similar to Google endorses safe browsing (20)

GOOGLE ADVANCED PROTECTION PROGRAM.pptx
GOOGLE ADVANCED  PROTECTION PROGRAM.pptxGOOGLE ADVANCED  PROTECTION PROGRAM.pptx
GOOGLE ADVANCED PROTECTION PROGRAM.pptx
 
How secure is two factor authentication (2 fa)
How secure is two factor authentication (2 fa)How secure is two factor authentication (2 fa)
How secure is two factor authentication (2 fa)
 
Why GO Global has never been hacked
Why GO Global has never been hackedWhy GO Global has never been hacked
Why GO Global has never been hacked
 
The Google Hack VSeries.pdf
The Google Hack VSeries.pdfThe Google Hack VSeries.pdf
The Google Hack VSeries.pdf
 
5 Steps to Secure Google Drive
5 Steps to Secure Google Drive5 Steps to Secure Google Drive
5 Steps to Secure Google Drive
 
google-apps-security-and-compliance-whitepaper (1)
google-apps-security-and-compliance-whitepaper (1)google-apps-security-and-compliance-whitepaper (1)
google-apps-security-and-compliance-whitepaper (1)
 
REVIEW OF GOOGLE’S CYBER SECURITY POLICYNAMEINSTRUCTOR’S N.docx
REVIEW OF GOOGLE’S CYBER SECURITY POLICYNAMEINSTRUCTOR’S N.docxREVIEW OF GOOGLE’S CYBER SECURITY POLICYNAMEINSTRUCTOR’S N.docx
REVIEW OF GOOGLE’S CYBER SECURITY POLICYNAMEINSTRUCTOR’S N.docx
 
Mobile App Security Protecting Your App from Cyber Threats.edited.docx
Mobile App Security Protecting Your App from Cyber Threats.edited.docxMobile App Security Protecting Your App from Cyber Threats.edited.docx
Mobile App Security Protecting Your App from Cyber Threats.edited.docx
 
Cybersecurity - Best Practices for Small Businesses.pdf
Cybersecurity - Best Practices for Small Businesses.pdfCybersecurity - Best Practices for Small Businesses.pdf
Cybersecurity - Best Practices for Small Businesses.pdf
 
Application security (APP) and CRM or ERP extension solutions
Application security (APP) and CRM or ERP extension solutionsApplication security (APP) and CRM or ERP extension solutions
Application security (APP) and CRM or ERP extension solutions
 
5 Ways to Stay #CyberSecure
5 Ways to Stay #CyberSecure5 Ways to Stay #CyberSecure
5 Ways to Stay #CyberSecure
 
Viruses, Biometrics, Encryption
Viruses, Biometrics, EncryptionViruses, Biometrics, Encryption
Viruses, Biometrics, Encryption
 
Understanding the web browser threat
Understanding the web browser threatUnderstanding the web browser threat
Understanding the web browser threat
 
5 Reasons Why Your Business Should Consider Strong Authentication!
5 Reasons Why Your Business Should Consider Strong Authentication!5 Reasons Why Your Business Should Consider Strong Authentication!
5 Reasons Why Your Business Should Consider Strong Authentication!
 
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
 
2 Factor Authentication for Wordpress
2 Factor Authentication for Wordpress2 Factor Authentication for Wordpress
2 Factor Authentication for Wordpress
 
Combating Cyber Crime by Priyanka Tomar @ OWASP Delhi July, 2014 Meeting
Combating Cyber Crime by Priyanka Tomar @ OWASP Delhi July, 2014 MeetingCombating Cyber Crime by Priyanka Tomar @ OWASP Delhi July, 2014 Meeting
Combating Cyber Crime by Priyanka Tomar @ OWASP Delhi July, 2014 Meeting
 
WithSecure Deepguard WhitePaper
WithSecure Deepguard WhitePaperWithSecure Deepguard WhitePaper
WithSecure Deepguard WhitePaper
 
Mobile App Security How Bahrain Development Companies Ensure Protection.edite...
Mobile App Security How Bahrain Development Companies Ensure Protection.edite...Mobile App Security How Bahrain Development Companies Ensure Protection.edite...
Mobile App Security How Bahrain Development Companies Ensure Protection.edite...
 
Internet transaction and communication security
Internet transaction and communication securityInternet transaction and communication security
Internet transaction and communication security
 

Google endorses safe browsing

  • 1. Google endorses ‘Safe Browsing Security is always at the back of everyone’s mind, whether it’s using internet or web applications. Security concerns, have since long influenced the very way users, use Web. Realising this, service providers of today’s time are constantly on alert, to ensure overall security. Talking about one such service provider, we have Google who regularly studies the threat landscape and offers regular internet security updates – warnings. Lately, Google announced that they will warn their users with security warnings for suspected state-sponsored attacks. For users, who Google believe are being targeted, Google will flash a message on the top of the page reading ‘Warning: We believe state-sponsored attackers may be attempting to compromise your account or computer. Protect yourself now’. Google also emphasizes that, if a user sees such a warning it does not necessarily mean that the users account has been hijacked. It implies that Google believes that the user may be a target for malware or phishing. Google also clarifies that these warnings are not being shown because Google’s internal systems have been compromised or because of a particular attack, instead it is only to alert for the user to be prepared for probable chances of an attack.
  • 2. Taking a step further, Google also suggests few immediate steps, which can help the user secure their accounts. These steps include: Creating a unique password that has a good mix of capital-lowercase letters- punctuation marks and numbers Enabling 2-step verification for additional security Updating the browser, operating system, plug-ins, document editors and so-on, regularly Look for https://accounts.google.com/ in your browser bar, while signing in to Google as attackers often send links through fake sign-in pages, to steal your password Eric Grosse, VP Security Engineering, further highlights that Google’s detailed analysis along with victim reports; strongly suggest the involvement of states or groups that are state-sponsored. Being a leading network security provider, Cyberoam appreciates the proactiveness Google is endorsing in terms of ensuring user Security. It is really worth applause, that Google takes steps to notify users about attacks/ probable attacks, so that users can take the right step to protect their privacy.