Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Identity & Access

Google Discontinuing Bluetooth Titan Security Key

Titan Security Key

Google on Monday announced that it’s discontinuing the Bluetooth version of the Titan Security Key and it will only offer devices that have near-field communication (NFC) functionality.

Titan Security Key

Google on Monday announced that it’s discontinuing the Bluetooth version of the Titan Security Key and it will only offer devices that have near-field communication (NFC) functionality.

The company will only offer two types of Titan security keys: a USB-A version and a USB-C version, both with NFC capabilities. These devices will enable users to authenticate either by plugging in the device to the corresponding USB port, or by simply tapping the security key on the back of their Android or iOS device to sign in using NFC.

Google has argued that NFC functionality is currently supported by many smartphones, which is why it has decided to focus on NFC and discontinue the Bluetooth version of the Titan Security Key.

However, the tech giant noted that Bluetooth keys will continue to work and warranties for these devices will be honored.

The USB-A key includes a USB-A to USB-C adapter and is available for $30. The USB-C version has a retail price of $35. Owners of iPads that have a lightning connector can also acquire an adapter for their USB-A key.

Google advertises security keys, which serve as a second authentication factor when logging in to an account, as the best way to keep accounts safe. However, over the past years, researchers have demonstrated various attacks against Google’s Titan Security Key.

In 2019, Microsoft alerted Google of a potentially serious issue that allowed Bluetooth attacks, and earlier this year researchers showed how Titan and security keys from other vendors could be cloned.

Advertisement. Scroll to continue reading.

Related: New YubiKey 5C NFC Security Key Brings NFC, USB-C Connections

Related: Google Open Sources Code for Security Key Devices

Related: Google Brings Titan Security Keys to More Countries

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.

Register

Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.

Register

Expert Insights

Related Content

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Mobile & Wireless

Infonetics Research has shared excerpts from its Mobile Device Security Client Software market size and forecasts report, which tracks enterprise and consumer security client...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Mobile & Wireless

Critical security flaws expose Samsung’s Exynos modems to “Internet-to-baseband remote code execution” attacks with no user interaction. Project Zero says an attacker only needs...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Mobile & Wireless

Technical details published for an Arm Mali GPU flaw leading to arbitrary kernel code execution and root on Pixel 6.