Skip to content
Techzine Global
  • Home
  • Topstories
  • Topics
    • Analytics
    • Applications
    • Collaboration
    • Data Management
    • Devices
    • Devops
    • Infrastructure
    • Privacy & Compliance
    • Security
  • Insights
    • All Insights
    • Agentic AI
    • Analytics
    • Cloud ERP
    • Generative AI
    • IT in Retail
    • NIS2
    • RSAC 2025 Conference
    • Security Platforms
    • SentinelOne
  • More
    • Become a partner
    • About us
    • Contact us
    • Terms and conditions
    • Privacy Policy
  • Techzine Global
  • Techzine Netherlands
  • Techzine Belgium
  • Techzine TV
  • ICTMagazine Netherlands
  • ICTMagazine Belgium
Techzine » News » Security » Google adds new security to user accounts
2 min Security

Google adds new security to user accounts

Jim PeddNovember 1, 2018 1:35 pmSeptember 8, 2019
Google adds new security to user accounts

Google has improved the security of user accounts in recent weeks. Today, four new features have been announced, specifically aimed at protecting an account before and after someone logs in. In addition, a new feature has been unveiled that makes accounts easier to restore if they are hacked.

That’s what Google writes in a new blog. The updates were revealed by product manager Jonathan Skelker, who announced that it is no longer possible to log into a Google Account if JavaScript – the programming language used to enable interactive web pages – is disabled.

Four new features

Google does this because JavaScript is the main tool for determining whether a user is at risk when trying to log in. If JavaScript is disabled, Google will not be able to run those tests. By the way, users hardly ever switch off JavaScript, but malware bots do so all the more. According to Skelker, approximately 0.01 percent of users are affected.

A second feature alerts users about possible malware apps on their Android phones. According to Google, it can notify people via the Google Play Protect scanner, which has a list of malware apps. This can also be viewed via the Google Security Checkup menu.

Function three is a warning to users when they are about to share their account information with third party websites and apps. We’ll notify you when you give a third party site or app access to sensitive data – such as your Gmail data or Google Contacts – but we’ll expand this over the next few weeks so you’ll know if you’re sharing other data from your Google Account.

Finally, Google changes the procedure that allows users to restore a hacked account. Google lets users confirm certain settings, check and secure their other Google accounts, check financial activity and see if any data is missing.

This news article was automatically translated from Dutch to give Techzine.eu a head start. All news articles after September 1, 2019 are written in native English and NOT translated. All our background stories are written in native English as well. For more information read our launch article.

Tags:

Google / Google Account / Javascript / Security

"*" indicates required fields

This field is for validation purposes and should be left unchanged.

Stay tuned, subscribe!

Nieuwsbrieven*

Related

Google: AI likely aided attackers to develop a zero-day

mnemonic opens Dutch Security Operations Centre (SOC) and relocates to new office in Utrecht

Google Cloud and Wiz build multi-cloud platform on top of Security Graph

Attackers are targeting developers via Slack and Google Sites

Editor picks

SAP blocks external AI agents. Salesforce and ServiceNow don’t.

At SAP, everything runs through Joule, whether you like it or not

Alteryx Inspire: Business analysts will become the architects of AI

Techzine Global attended Alteryx Inspire 2026 this month in Orlando t...

ASML signs new customer: what does India’s Tata Electronics do?

ASML will supply machines to Tata Electronics for India’s first chi...

UiPath CEO: Agentic AI shifts the definition of a software builder

With a CEO who positively likes to call software automation services ...

Techzine.tv

Cisco doubled down on compute for the AI and edge era

Cisco doubled down on compute for the AI and edge era

Cisco's 102.4 terabit chip supercharges AI data centers

Cisco's 102.4 terabit chip supercharges AI data centers

How to migrate from Redis to Valkey with zero downtime

How to migrate from Redis to Valkey with zero downtime

Discover how edge AI transforms manufacturing with private 5G

Discover how edge AI transforms manufacturing with private 5G

Read more on Security

Cisco Secure Workload vulnerability can be exploited via API call

Cisco Secure Workload vulnerability can be exploited via API call

Cisco warns of a critical vulnerability in Secure Workload that grants attackers full Site Admin privileges w...

Erik van Klinken 11 hours ago
No Mythos, no problem: commodity AI can squash bugs too
Top story

No Mythos, no problem: commodity AI can squash bugs too

The latest and greatest AI models from Anthropic and OpenAI are apparently too dangerous to unleash upon the ...

Erik van Klinken 15 hours ago
Vulnerabilities are the number one cause of data breaches for the first time

Vulnerabilities are the number one cause of data breaches for the first time

For the first time in 19 years, exploiting vulnerabilities has become the primary entry point for data breach...

Berry Zwets 2 days ago
Akamai acquires LayerX for browser-native AI-era workforce controls
Top story

Akamai acquires LayerX for browser-native AI-era workforce controls

Akamai is a cloud cybersecurity company that dedicates itself to the provision of what it calls “superior t...

Adrian Bridgwater May 18, 2026

Expert Talks

Power critical workloads with all-NVMe active-active storage for non-stop enterprise operations 

Power critical workloads with all-NVMe active-active storage for non-stop enterprise operations 

Enterprise infrastructure has reached a turning point where planned d...

Five tips for embracing continuous deployment as a DevOps mindset

Five tips for embracing continuous deployment as a DevOps mindset

Continuous deployment offers quicker releases and better software, bu...

The only thing constant in technology is change, except for unrealistic hopefulness

If anyone was ever forced to pick the tritest phrase in the world, it...

mnemonic opens Dutch Security Operations Centre (SOC) and relocates to new office in Utrecht

The new SOC in the Netherlands further strengthens mnemonic’s regio...

Tech calendar

Infosecurity Europe

June 2, 2026 London

.NEXT On Tour Amsterdam

June 9, 2026 Amsterdam

Oxygenate

June 11, 2026 Hilversum

VivaTech

June 17, 2026 Paris Expo Porte de Versailles 1 Place de la Porte de Versailles Pavillon 7 F-75015 Paris France

GITEX AI EUROPE 2026

June 30, 2026 Messe Berlin Exhibition Center, South Entrance

GOTO Copenhagen 2026

September 28, 2026 TAP1, Raffinaderivej 10, 2300 København S, Denmark

Whitepapers

Experience Synology’s latest enterprise backup solution

Experience Synology’s latest enterprise backup solution

How do you ensure your company data is both secure and quickly recove...

How to choose the right Enterprise Linux platform?

How to choose the right Enterprise Linux platform?

"A Buyer's Guide to Enterprise Linux" comprehensively analyzes the mo...

Enhance your data protection strategy for 2025

The Data Protection Guide 2025 explores the essential strategies and...

Strengthen your cybersecurity with DNS best practices

The white paper "DNS Best Practices" by Infoblox presents essential g...

Techzine Global

Techzine focusses on IT professionals and business decision makers by publishing the latest IT news and background stories. The goal is to help IT professionals get acquainted with new innovative products and services, but also to offer in-depth information to help them understand products and services better.

Follow us

Twitter
LinkedIn
YouTube

© 2026 Dolphin Publications B.V.
All rights reserved.

Techzine Service

  • Become a partner
  • Advertising
  • About Us
  • Contact
  • Terms & Conditions
  • Privacy Statement