Google this week announced a security update for Google Drive that is meant to make sharing links more secure for files stored with the service.
With this update, the search advertising giant is adding a resource key to sharing links, which will impact access to the files for those users who haven’t yet viewed the files.
“Once the update has been applied to a file, users who haven’t viewed the file before will have to use a URL containing the resource key to gain access, and those who have viewed the file before or have direct access will not need the resource key to access the file,” Google said in a note accompanying the update.
Google Workspace admins have until July 23 to decide whether or how to apply the security update within their organization. In the Alert Center, they can view how many files, folders, shared drives, and users are impacted.
Starting July 26, end users who own or manage files that will be affected will receive an email notification and will have until September 13 to decide how the update is applied, provided that their admin has approved the update.
Also starting July 26, Google will notify users who are not part of a Google Workspace domain to inform them of impacted files. They will have until September 13 to decide how the update is applied.
The update is applicable to all Google Workspace, G Suite Basic, and Business customers, as well as to users who have personal Google accounts.
Related: Google Workspace Gets Client-Side Encryption
Related: Google Workspace Gets New Security Features
Related: Google Boosts Detection of Malicious Documents in Gmail

More from Ionut Arghire
- Former Ubiquiti Employee Who Posed as Hacker Pleads Guilty
- Atlassian Warns of Critical Jira Service Management Vulnerability
- Exploitation of Oracle E-Business Suite Vulnerability Starts After PoC Publication
- Google Shells Out $600,000 for OSS-Fuzz Project Integrations
- F5 BIG-IP Vulnerability Can Lead to DoS, Code Execution
- Flaw in Cisco Industrial Appliances Allows Malicious Code to Persist Across Reboots
- HeadCrab Botnet Ensnares 1,200 Redis Servers for Cryptomining
- Malicious NPM, PyPI Packages Stealing User Information
Latest News
- Big China Spy Balloon Moving East Over US, Pentagon Says
- Former Ubiquiti Employee Who Posed as Hacker Pleads Guilty
- Cyber Insights 2023: Venture Capital
- Atlassian Warns of Critical Jira Service Management Vulnerability
- High-Severity Privilege Escalation Vulnerability Patched in VMware Workstation
- Exploitation of Oracle E-Business Suite Vulnerability Starts After PoC Publication
- China Says It’s Looking Into Report of Spy Balloon Over US
- GoAnywhere MFT Users Warned of Zero-Day Exploit
