Skip to content
Techzine Global
  • Home
  • Topstories
  • Topics
    • Analytics
    • Applications
    • Collaboration
    • Data Management
    • Devices
    • Devops
    • Infrastructure
    • Privacy & Compliance
    • Security
  • Insights
    • All Insights
    • Agentic AI
    • Analytics
    • Cloud ERP
    • Generative AI
    • IT in Retail
    • NIS2
    • RSAC 2025 Conference
    • Security Platforms
    • SentinelOne
  • More
    • Become a partner
    • About us
    • Contact us
    • Terms and conditions
    • Privacy Policy
  • Techzine Global
  • Techzine Netherlands
  • Techzine Belgium
  • Techzine TV
  • ICTMagazine Netherlands
  • ICTMagazine Belgium
Techzine » News » Security » Google adds new security to user accounts
2 min Security

Google adds new security to user accounts

Jim PeddNovember 1, 2018 1:35 pmSeptember 8, 2019
Google adds new security to user accounts

Google has improved the security of user accounts in recent weeks. Today, four new features have been announced, specifically aimed at protecting an account before and after someone logs in. In addition, a new feature has been unveiled that makes accounts easier to restore if they are hacked.

That’s what Google writes in a new blog. The updates were revealed by product manager Jonathan Skelker, who announced that it is no longer possible to log into a Google Account if JavaScript – the programming language used to enable interactive web pages – is disabled.

Four new features

Google does this because JavaScript is the main tool for determining whether a user is at risk when trying to log in. If JavaScript is disabled, Google will not be able to run those tests. By the way, users hardly ever switch off JavaScript, but malware bots do so all the more. According to Skelker, approximately 0.01 percent of users are affected.

A second feature alerts users about possible malware apps on their Android phones. According to Google, it can notify people via the Google Play Protect scanner, which has a list of malware apps. This can also be viewed via the Google Security Checkup menu.

Function three is a warning to users when they are about to share their account information with third party websites and apps. We’ll notify you when you give a third party site or app access to sensitive data – such as your Gmail data or Google Contacts – but we’ll expand this over the next few weeks so you’ll know if you’re sharing other data from your Google Account.

Finally, Google changes the procedure that allows users to restore a hacked account. Google lets users confirm certain settings, check and secure their other Google accounts, check financial activity and see if any data is missing.

This news article was automatically translated from Dutch to give Techzine.eu a head start. All news articles after September 1, 2019 are written in native English and NOT translated. All our background stories are written in native English as well. For more information read our launch article.

Tags:

Google / Google Account / Javascript / Security

"*" indicates required fields

This field is for validation purposes and should be left unchanged.

Stay tuned, subscribe!

Nieuwsbrieven*

Related

Google: AI likely aided attackers to develop a zero-day

mnemonic opens Dutch Security Operations Centre (SOC) and relocates to new office in Utrecht

Google Cloud and Wiz build multi-cloud platform on top of Security Graph

Attackers are targeting developers via Slack and Google Sites

Editor picks

AWS invests massively in AI: can it stay ahead of the pack?

AWS is still the biggest hyperscaler, even though the gap with Micros...

On Anti-Ransomware Day, some good news arrives for cyber defenders

A surprisingly positive development: ransomware is on the decline. Th...

ASML signs new customer: what does India’s Tata Electronics do?

ASML will supply machines to Tata Electronics for India’s first chi...

The UI is dead, long live the agent: ServiceNow goes headless and opens its platform

Door is open to third-party agents

Techzine.tv

How to migrate from Redis to Valkey with zero downtime

How to migrate from Redis to Valkey with zero downtime

Why major tech companies forked Redis to create Valkey

Why major tech companies forked Redis to create Valkey

EU digital sovereignty and policy: Cisco's perspective

EU digital sovereignty and policy: Cisco's perspective

Cisco wants to tackle the 80-tool security problem

Cisco wants to tackle the 80-tool security problem

Read more on Security

Iran threatens to impose fees on subsea cables in the Strait of Hormuz

Iran threatens to impose fees on subsea cables in the Strait of Hormuz

The Iranian government has announced that it intends to impose tolls on undersea internet cables in the Strai...

Erik van Klinken 12 hours ago
TeamPCP compromises Python libraries via supply chain attack

TeamPCP compromises Python libraries via supply chain attack

The hacker group TeamPCP uploaded two malicious versions of the popular Python library LiteLLM to PyPI. Using...

Berry Zwets 6 hours ago
It’s raining Linux vulnerabilities: what’s going on?
Top story

It’s raining Linux vulnerabilities: what’s going on?

In recent weeks, alarm bells have been ringing repeatedly over critical vulnerabilities in the Linux kernel. ...

Erik van Klinken May 15, 2026
Akamai acquires LayerX for browser-native AI-era workforce controls
Top story

Akamai acquires LayerX for browser-native AI-era workforce controls

Akamai is a cloud cybersecurity company that dedicates itself to the provision of what it calls “superior t...

Adrian Bridgwater 14 hours ago

Expert Talks

Five tips for embracing continuous deployment as a DevOps mindset

Five tips for embracing continuous deployment as a DevOps mindset

Continuous deployment offers quicker releases and better software, bu...

The only thing constant in technology is change, except for unrealistic hopefulness

The only thing constant in technology is change, except for unrealistic hopefulness

If anyone was ever forced to pick the tritest phrase in the world, it...

mnemonic opens Dutch Security Operations Centre (SOC) and relocates to new office in Utrecht

The new SOC in the Netherlands further strengthens mnemonic’s regio...

AI governance: the invisible prerequisite for success

When AI never gets past the demo

Tech calendar

Infosecurity Europe

June 2, 2026 London

.NEXT On Tour Amsterdam

June 9, 2026 Amsterdam

Oxygenate

June 11, 2026 Hilversum

VivaTech

June 17, 2026 Paris Expo Porte de Versailles 1 Place de la Porte de Versailles Pavillon 7 F-75015 Paris France

GITEX AI EUROPE 2026

June 30, 2026 Messe Berlin Exhibition Center, South Entrance

GOTO Copenhagen 2026

September 28, 2026 TAP1, Raffinaderivej 10, 2300 København S, Denmark

Whitepapers

Experience Synology’s latest enterprise backup solution

Experience Synology’s latest enterprise backup solution

How do you ensure your company data is both secure and quickly recove...

How to choose the right Enterprise Linux platform?

How to choose the right Enterprise Linux platform?

"A Buyer's Guide to Enterprise Linux" comprehensively analyzes the mo...

Enhance your data protection strategy for 2025

The Data Protection Guide 2025 explores the essential strategies and...

Strengthen your cybersecurity with DNS best practices

The white paper "DNS Best Practices" by Infoblox presents essential g...

Techzine Global

Techzine focusses on IT professionals and business decision makers by publishing the latest IT news and background stories. The goal is to help IT professionals get acquainted with new innovative products and services, but also to offer in-depth information to help them understand products and services better.

Follow us

Twitter
LinkedIn
YouTube

© 2026 Dolphin Publications B.V.
All rights reserved.

Techzine Service

  • Become a partner
  • Advertising
  • About Us
  • Contact
  • Terms & Conditions
  • Privacy Statement