Google on Monday announced that it’s discontinuing the Bluetooth version of the Titan Security Key and it will only offer devices that have near-field communication (NFC) functionality.
The company will only offer two types of Titan security keys: a USB-A version and a USB-C version, both with NFC capabilities. These devices will enable users to authenticate either by plugging in the device to the corresponding USB port, or by simply tapping the security key on the back of their Android or iOS device to sign in using NFC.
Google has argued that NFC functionality is currently supported by many smartphones, which is why it has decided to focus on NFC and discontinue the Bluetooth version of the Titan Security Key.
However, the tech giant noted that Bluetooth keys will continue to work and warranties for these devices will be honored.
The USB-A key includes a USB-A to USB-C adapter and is available for $30. The USB-C version has a retail price of $35. Owners of iPads that have a lightning connector can also acquire an adapter for their USB-A key.
Google advertises security keys, which serve as a second authentication factor when logging in to an account, as the best way to keep accounts safe. However, over the past years, researchers have demonstrated various attacks against Google’s Titan Security Key.
In 2019, Microsoft alerted Google of a potentially serious issue that allowed Bluetooth attacks, and earlier this year researchers showed how Titan and security keys from other vendors could be cloned.
Related: New YubiKey 5C NFC Security Key Brings NFC, USB-C Connections
Related: Google Open Sources Code for Security Key Devices
Related: Google Brings Titan Security Keys to More Countries

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- In Other News: Government Use of Spyware, New Industrial Security Tools, Japan Router Hack
- Apple Denies Helping US Government Hack Russian iPhones
- Zero-Day in MOVEit File Transfer Software Exploited to Steal Data From Organizations
- Russia Blames US Intelligence for iOS Zero-Click Attacks
- Cisco Acquiring Armorblox for Predictive and Generative AI Technology
- Moxa Patches MXsecurity Vulnerabilities That Could Be Exploited in OT Attacks
- Organizations Warned of Salesforce ‘Ghost Sites’ Exposing Sensitive Information
- Organizations Warned of Backdoor Feature in Hundreds of Gigabyte Motherboards
Latest News
- Insider Q&A: Artificial Intelligence and Cybersecurity In Military Tech
- In Other News: Government Use of Spyware, New Industrial Security Tools, Japan Router Hack
- OpenAI Unveils Million-Dollar Cybersecurity Grant Program
- Galvanick Banks $10 Million for Industrial XDR Technology
- Information of 2.5M People Stolen in Ransomware Attack at Massachusetts Health Insurer
- US, South Korea Detail North Korea’s Social Engineering Techniques
- High-Severity Vulnerabilities Patched in Splunk Enterprise
- Idaho Hospitals Working to Resume Full Operations After Cyberattack
