Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Identity & Access

Google Brings Titan Security Keys to More Countries

Google this week announced that users in 10 countries can now take advantage of the hardware based two-factor authentication (2FA) functionality offered by the Titan Security Keys. 

Google this week announced that users in 10 countries can now take advantage of the hardware based two-factor authentication (2FA) functionality offered by the Titan Security Keys. 

These security keys provide additional security for users at higher risk, including IT administrators, executives, politicians, and activists, as they are often the intended victims of targeted attacks.

Last year, the Internet search giant made the Titan Security Keys bundle with USB-A/NFC and Bluetooth/USB/NFC keys available in the U.S., Canada, France, Japan, and the UK. 

In October 2019, Google released its USB-C Titan Security Key (which is made in collaboration with Yubico) in the U.S. At the end of January 2020, the company released open source code to allow users create their own security key devices.

Starting this week, both the bundle and the USB-C Titan Security Keys are also available to users in Austria, Germany, Italy, Spain, and Switzerland. Keys can be purchased on the Google Store, where organizations in select countries also them in bulk.

The security keys, Google explains, employ public-key cryptography to verify users’ identity and the URL of the login page, to prevent attackers from accessing accounts even if the credentials have been compromised. 

The security keys support FIDO standards to deliver strong protection against automated bots, bulk phishing attacks, and targeted phishing attacks, Google also says. For additional security, users at high risk are advised to also enroll in the company’s Advanced Protection Program (APP)

Additionally, the search giant is offering the Titan Security Keys for free to those working for federal political campaigns teams in the US, via the Defending Digital Campaigns organization. 

The Titan Security Keys can be used on any site where FIDO security keys are supported for 2FA. Such sites include popular services such as Google, 1Password, Bitbucket, Bitfinex, Coinbase, Dropbox, Facebook, GitHub, Salesforce, Stripe, Twitter, and more.

Related: Google Open Sources Code for Security Key Devices

Related: Google’s USB-C Titan Security Key Arrives in the U.S.

Related: Yubico Replacing YubiKey FIPS Devices Due to Security Issue

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Expert Insights

Related Content

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Identity & Access

Strata Identity has raised $26 million in a Series B funding round led by Telstra Ventures, with additional investment from Forgepoint Capital, Innovating Capital,...

Application Security

Electric car maker Tesla is using the annual Pwn2Own hacker contest to incentivize security researchers to showcase complex exploit chains that can lead to...

Application Security

Software maker Adobe on Tuesday released security patches for 29 documented vulnerabilities across multiple enterprise-facing products and warned that hackers could exploit these bugs...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Password management firm LastPass says the hackers behind an August data breach stole a massive stash of customer data, including password vault data that...

Application Security

Google’s Threat Analysis Group (TAG) has shared technical details on an Internet Explorer zero-day vulnerability exploited in attacks by North Korean hacking group APT37.