Skip to content
Techzine Global
  • Home
  • Topstories
  • Topics
    • Analytics
    • Applications
    • Collaboration
    • Data Management
    • Devices
    • Devops
    • Infrastructure
    • Privacy & Compliance
    • Security
  • Insights
    • All Insights
    • Agentic AI
    • Analytics
    • Cloud ERP
    • Generative AI
    • IT in Retail
    • NIS2
    • RSAC 2025 Conference
    • Security Platforms
    • SentinelOne
  • More
    • Become a partner
    • About us
    • Contact us
    • Terms and conditions
    • Privacy Policy
  • Techzine Global
  • Techzine Netherlands
  • Techzine Belgium
  • Techzine TV
  • ICTMagazine Netherlands
  • ICTMagazine Belgium
Techzine » News » Security » Google adds new security to user accounts
2 min Security

Google adds new security to user accounts

Jim PeddNovember 1, 2018 1:35 pmSeptember 8, 2019
Google adds new security to user accounts

Google has improved the security of user accounts in recent weeks. Today, four new features have been announced, specifically aimed at protecting an account before and after someone logs in. In addition, a new feature has been unveiled that makes accounts easier to restore if they are hacked.

That’s what Google writes in a new blog. The updates were revealed by product manager Jonathan Skelker, who announced that it is no longer possible to log into a Google Account if JavaScript – the programming language used to enable interactive web pages – is disabled.

Four new features

Google does this because JavaScript is the main tool for determining whether a user is at risk when trying to log in. If JavaScript is disabled, Google will not be able to run those tests. By the way, users hardly ever switch off JavaScript, but malware bots do so all the more. According to Skelker, approximately 0.01 percent of users are affected.

A second feature alerts users about possible malware apps on their Android phones. According to Google, it can notify people via the Google Play Protect scanner, which has a list of malware apps. This can also be viewed via the Google Security Checkup menu.

Function three is a warning to users when they are about to share their account information with third party websites and apps. We’ll notify you when you give a third party site or app access to sensitive data – such as your Gmail data or Google Contacts – but we’ll expand this over the next few weeks so you’ll know if you’re sharing other data from your Google Account.

Finally, Google changes the procedure that allows users to restore a hacked account. Google lets users confirm certain settings, check and secure their other Google accounts, check financial activity and see if any data is missing.

This news article was automatically translated from Dutch to give Techzine.eu a head start. All news articles after September 1, 2019 are written in native English and NOT translated. All our background stories are written in native English as well. For more information read our launch article.

Tags:

Google / Google Account / Javascript / Security

"*" indicates required fields

This field is for validation purposes and should be left unchanged.

Stay tuned, subscribe!

Nieuwsbrieven*

Related

Google refutes reports of major Gmail breach

Google Cloud Security Summit: agentic SOCs and AI assurance

Google’s AI Big Sleep discovers twenty new security vulnerabilities in open source

Security teams miss threats due to data overload

Editor picks

Salesforce enters ITSM market, will ServiceNow regret its CRM move?

AI-driven IT Service Management

Dutch restrict Nexperia to keep its chip secrets outside of China

For one year, Nexperia is only allowed to take decisive action when t...

What is vector search and when should you use it?

Search can be better with vectors

Mega merger in the data world: Fivetran and dbt Labs join forces

With combined annual revenues of $600 million (€518.5 million), the...

Techzine.tv

In-depth conversation into Agentforce IT service and how it wants to change the ITSM market

In-depth conversation into Agentforce IT service and how it wants to change the ITSM market

Managing the AI chaos with ServiceNow's AI Control Tower

Managing the AI chaos with ServiceNow's AI Control Tower

Nutanix CTO explains their VMware alternative and multi-cloud strategy

Nutanix CTO explains their VMware alternative and multi-cloud strategy

Slack is evolving into a work operating system

Slack is evolving into a work operating system

Read more on Security

266,000 F5 BIG-IP systems vulnerable

266,000 F5 BIG-IP systems vulnerable

A scan has revealed that more than 266,000 F5 BIG-IP instances are accessible from the internet due to the se...

Berry Zwets 2 hours ago
Why human-centric security cannot do without AI
Top story

Why human-centric security cannot do without AI

In practice, hacking people often proves easier than directly attacking systems. The vast majority of cyberat...

Berry Zwets September 26, 2025
Hackers exploit Cisco vulnerability to install rootkit on switches

Hackers exploit Cisco vulnerability to install rootkit on switches

A new attack campaign, dubbed Operation Zero Disco by Trend Micro , exploits a vulnerability in Cisco's Simpl...

Mels Dees 5 hours ago
Fifty years of security by design: why isn’t it working?
Top story

Fifty years of security by design: why isn’t it working?

Professor Bibi van den Berg on missed opportunities

Kim Loohuis October 8, 2025

Expert Talks

How to Safeguard and Prepare Exchange Server against Natural Disasters?

How to Safeguard and Prepare Exchange Server against Natural Disasters?

It is critical to make sure that the Exchange Server is protected fro...

Minimizing liability is not the same as security: Lessons learned from Collin’s Aerospace cyberattack

Minimizing liability is not the same as security: Lessons learned from Collin’s Aerospace cyberattack

Key points: A ransomware attack targeting the ARINC vMUSE syste...

How Split-Second Data Performance and Sovereignty Keep the Netherlands Moving

Dutch enterprises are combining open-source foundations with enterpri...

How to Recover My Archived PST Files in Outlook?

An archive PST file in Outlook is a file in which older emails and ot...

Tech calendar

Luxembourg Venture Days

October 22, 2025 Luxembourg

Synology Solution Day 2025

October 30, 2025 Amsterdam

Dell Technologies Forum

November 13, 2025 Nieuwegein

BrickCon The Databricks Community Conference

December 3, 2025 Orlando, Florida

Appdevcon

March 10, 2026 Amsterdam

Webdevcon

March 10, 2026 Amsterdam

Whitepapers

Experience Synology’s latest enterprise backup solution

Experience Synology’s latest enterprise backup solution

How do you ensure your company data is both secure and quickly recove...

How to choose the right Enterprise Linux platform?

How to choose the right Enterprise Linux platform?

"A Buyer's Guide to Enterprise Linux" comprehensively analyzes the mo...

Enhance your data protection strategy for 2025

The Data Protection Guide 2025 explores the essential strategies and...

Strengthen your cybersecurity with DNS best practices

The white paper "DNS Best Practices" by Infoblox presents essential g...

Techzine Global

Techzine focusses on IT professionals and business decision makers by publishing the latest IT news and background stories. The goal is to help IT professionals get acquainted with new innovative products and services, but also to offer in-depth information to help them understand products and services better.

Follow us

Twitter
LinkedIn
YouTube

© 2025 Dolphin Publications B.V.
All rights reserved.

Techzine Service

  • Become a partner
  • Advertising
  • About Us
  • Contact
  • Terms & Conditions
  • Privacy Statement