Skip to content
Techzine Global
  • Home
  • Topstories
  • Topics
    • Analytics
    • Applications
    • Collaboration
    • Data Management
    • Devices
    • Devops
    • Infrastructure
    • Privacy & Compliance
    • Security
  • Insights
    • All Insights
    • Agentic AI
    • Analytics
    • Cloud ERP
    • Generative AI
    • IT in Retail
    • NIS2
    • RSAC 2025 Conference
    • Security Platforms
    • SentinelOne
  • More
    • Become a partner
    • About us
    • Contact us
    • Terms and conditions
    • Privacy Policy
  • Techzine Global
  • Techzine Netherlands
  • Techzine Belgium
  • Techzine TV
  • ICTMagazine Netherlands
  • ICTMagazine Belgium
Techzine » News » Security » Google adds new security to user accounts
2 min Security

Google adds new security to user accounts

Jim PeddNovember 1, 2018 1:35 pmSeptember 8, 2019
Google adds new security to user accounts

Google has improved the security of user accounts in recent weeks. Today, four new features have been announced, specifically aimed at protecting an account before and after someone logs in. In addition, a new feature has been unveiled that makes accounts easier to restore if they are hacked.

That’s what Google writes in a new blog. The updates were revealed by product manager Jonathan Skelker, who announced that it is no longer possible to log into a Google Account if JavaScript – the programming language used to enable interactive web pages – is disabled.

Four new features

Google does this because JavaScript is the main tool for determining whether a user is at risk when trying to log in. If JavaScript is disabled, Google will not be able to run those tests. By the way, users hardly ever switch off JavaScript, but malware bots do so all the more. According to Skelker, approximately 0.01 percent of users are affected.

A second feature alerts users about possible malware apps on their Android phones. According to Google, it can notify people via the Google Play Protect scanner, which has a list of malware apps. This can also be viewed via the Google Security Checkup menu.

Function three is a warning to users when they are about to share their account information with third party websites and apps. We’ll notify you when you give a third party site or app access to sensitive data – such as your Gmail data or Google Contacts – but we’ll expand this over the next few weeks so you’ll know if you’re sharing other data from your Google Account.

Finally, Google changes the procedure that allows users to restore a hacked account. Google lets users confirm certain settings, check and secure their other Google accounts, check financial activity and see if any data is missing.

This news article was automatically translated from Dutch to give Techzine.eu a head start. All news articles after September 1, 2019 are written in native English and NOT translated. All our background stories are written in native English as well. For more information read our launch article.

Tags:

Google / Google Account / Javascript / Security

"*" indicates required fields

This field is for validation purposes and should be left unchanged.

Stay tuned, subscribe!

Nieuwsbrieven*

Related

U.S. bans import of new routers due to security concerns

Google Cloud expands its AI security capabilities through Wiz integration

Rubrik adds Google Workspace backup with air-gapped protection

Harness secures AI code and AI apps with two new modules

Editor picks

HPE sees the network as a security sensor: what does that mean?

During the RSAC 2026 Conference in San Francisco, we talked to no few...

Seven new hyperscale data centers to be built in the Netherlands

At least 7 hyperscale data centers are under construction in the Neth...

Blind trust in hardware vendors is always a bad idea

Supply chain security now more important than ever

Claude Code leak exposes many of Anthropic’s secrets

An Anthropic employee has (seemingly) inadvertently shared Claude Cod...

Techzine.tv

How to migrate from Redis to Valkey with zero downtime

How to migrate from Redis to Valkey with zero downtime

EU digital sovereignty and policy: Cisco's perspective

EU digital sovereignty and policy: Cisco's perspective

groundcover uses EBPF and AI agents to modernize observability

groundcover uses EBPF and AI agents to modernize observability

IFS builds an industrial AI ecosystem through partnerships

IFS builds an industrial AI ecosystem through partnerships

Read more on Security

IGEL brings ‘Smarter, Zero Trust’ approach Contextual Access to endpoints

IGEL brings ‘Smarter, Zero Trust’ approach Contextual Access to endpoints

IGEL announces Contextual Access, an extension to its existing platform that makes endpoints context-aware an...

Berry Zwets 3 days ago
JFrog Artifactory: how to secure binaries in the AI era
Top story

JFrog Artifactory: how to secure binaries in the AI era

The explosion of AI-generated code is creating a security crisis that traditional manual approaches simply ca...

Coen van Eenbergen 21 hours ago
Securing AI agents: Okta’s approach to identity governance
Top story

Securing AI agents: Okta’s approach to identity governance

As artificial intelligence agents are set to become more autonomous in enterprise environments, organizations...

Sander Almekinders 1 day ago
Axios supply chain attack victim posts postmortem to prevent a repeat

Axios supply chain attack victim posts postmortem to prevent a repeat

Another supply chain security threat emerged this week with the compromise of Axios. It is a popular JavaScri...

Erik van Klinken 22 hours ago

Expert Talks

Infosecurity Europe announces first wave of keynote speakers for 2026

Infosecurity Europe announces first wave of keynote speakers for 2026

Infosecurity Europe, the most influential information security event...

Better connected business technology is essential for prosperity in the Netherlands 

Better connected business technology is essential for prosperity in the Netherlands 

According to PwC, the Netherlands ranks fourth in Europe for producin...

The zero-drift frontier: modern edge demands on Kubernetes

Edge computing has come to the fore. Too often, edge computing gets c...

When is an SBOM not an SBOM? CISA’s Minimum Elements

In August 2025, CISA (the US Cybersecurity Infrastructure & Infra...

Tech calendar

GITEX ASIA 2026

April 8, 2026 Singapore

Southeast Asia AI Application Summit 2026

April 23, 2026 Bangkok

SAS Innovate 2026

April 27, 2026 Grapevine

Team '26

May 5, 2026 Anaheim

GISEC GLOBAL 2026

May 5, 2026 DUBAI

Red Hat Summit

May 11, 2026 Atlanta

Whitepapers

Experience Synology’s latest enterprise backup solution

Experience Synology’s latest enterprise backup solution

How do you ensure your company data is both secure and quickly recove...

How to choose the right Enterprise Linux platform?

How to choose the right Enterprise Linux platform?

"A Buyer's Guide to Enterprise Linux" comprehensively analyzes the mo...

Enhance your data protection strategy for 2025

The Data Protection Guide 2025 explores the essential strategies and...

Strengthen your cybersecurity with DNS best practices

The white paper "DNS Best Practices" by Infoblox presents essential g...

Techzine Global

Techzine focusses on IT professionals and business decision makers by publishing the latest IT news and background stories. The goal is to help IT professionals get acquainted with new innovative products and services, but also to offer in-depth information to help them understand products and services better.

Follow us

Twitter
LinkedIn
YouTube

© 2026 Dolphin Publications B.V.
All rights reserved.

Techzine Service

  • Become a partner
  • Advertising
  • About Us
  • Contact
  • Terms & Conditions
  • Privacy Statement