Skip to content
Techzine Global
  • Home
  • Topstories
  • Topics
    • Analytics
    • Applications
    • Collaboration
    • Data Management
    • Devices
    • Devops
    • Infrastructure
    • Privacy & Compliance
    • Security
  • Insights
    • All Insights
    • Agentic AI
    • Analytics
    • Cloud ERP
    • Generative AI
    • IT in Retail
    • NIS2
    • RSAC 2025 Conference
    • Security Platforms
    • SentinelOne
  • More
    • Become a partner
    • About us
    • Contact us
    • Terms and conditions
    • Privacy Policy
  • Techzine Global
  • Techzine Netherlands
  • Techzine Belgium
  • Techzine TV
  • ICTMagazine Netherlands
  • ICTMagazine Belgium
Techzine » News » Security » Google adds new security to user accounts
2 min Security

Google adds new security to user accounts

Jim PeddNovember 1, 2018 1:35 pmSeptember 8, 2019
Google adds new security to user accounts

Google has improved the security of user accounts in recent weeks. Today, four new features have been announced, specifically aimed at protecting an account before and after someone logs in. In addition, a new feature has been unveiled that makes accounts easier to restore if they are hacked.

That’s what Google writes in a new blog. The updates were revealed by product manager Jonathan Skelker, who announced that it is no longer possible to log into a Google Account if JavaScript – the programming language used to enable interactive web pages – is disabled.

Four new features

Google does this because JavaScript is the main tool for determining whether a user is at risk when trying to log in. If JavaScript is disabled, Google will not be able to run those tests. By the way, users hardly ever switch off JavaScript, but malware bots do so all the more. According to Skelker, approximately 0.01 percent of users are affected.

A second feature alerts users about possible malware apps on their Android phones. According to Google, it can notify people via the Google Play Protect scanner, which has a list of malware apps. This can also be viewed via the Google Security Checkup menu.

Function three is a warning to users when they are about to share their account information with third party websites and apps. We’ll notify you when you give a third party site or app access to sensitive data – such as your Gmail data or Google Contacts – but we’ll expand this over the next few weeks so you’ll know if you’re sharing other data from your Google Account.

Finally, Google changes the procedure that allows users to restore a hacked account. Google lets users confirm certain settings, check and secure their other Google accounts, check financial activity and see if any data is missing.

This news article was automatically translated from Dutch to give Techzine.eu a head start. All news articles after September 1, 2019 are written in native English and NOT translated. All our background stories are written in native English as well. For more information read our launch article.

Tags:

Google / Google Account / Javascript / Security

"*" indicates required fields

This field is for validation purposes and should be left unchanged.

Stay tuned, subscribe!

Nieuwsbrieven*

Related

Google refutes reports of major Gmail breach

Google Cloud Security Summit: agentic SOCs and AI assurance

Google’s AI Big Sleep discovers twenty new security vulnerabilities in open source

Security teams miss threats due to data overload

Editor picks

Why your SOC needs a ROC

Qualys CEO Sumedh Thakar dives into vulnerability, risk and the ROC

Oracle sets out to be the system of record for AI

During AI World earlier this month, Oracle made a slew of AI announce...

Nvidia acquires significant stake in Nokia to accelerate 5G and 6G

Nvidia is paying $1 billion (€860 million) for a 2.9 percent stake ...

Cisco extends data center to the edge with Unified Edge

After AI POD and Unified Branch, now there is Unified Edge

Techzine.tv

SAP Business Network: $6.5 trillion B2B collaboration platform

SAP Business Network: $6.5 trillion B2B collaboration platform

Atlassian CTO on realistic AI: Rovo, data privacy & adoption

Atlassian CTO on realistic AI: Rovo, data privacy & adoption

Workday CTO outlines bold AI agent strategy and major acquisitions

Workday CTO outlines bold AI agent strategy and major acquisitions

SAP's AI migration tools from ECC to S/4HANA: faster and cheaper ERP transitions

SAP's AI migration tools from ECC to S/4HANA: faster and cheaper ERP transitions

Read more on Security

Why your SOC needs a ROC
Top story

Why your SOC needs a ROC

Qualys CEO Sumedh Thakar dives into vulnerability, risk and the ROC

Sander Almekinders October 31, 2025
Microsoft discovers backdoor that exploits OpenAI API

Microsoft discovers backdoor that exploits OpenAI API

Microsoft researchers discovered a backdoor that exploits the OpenAI Assistants API for command-and-control c...

Berry Zwets 17 hours ago
Hackers exploit vulnerability in JobMonster WordPress theme

Hackers exploit vulnerability in JobMonster WordPress theme

Hackers are actively exploiting a serious security vulnerability in the popular JobMonster WordPress theme. T...

Mels Dees 18 hours ago
KnowBe4: how workforce trust weans organizations off mistrust
Top story

KnowBe4: how workforce trust weans organizations off mistrust

Traditional security awareness training programs have perennially suffered from proof problem. When are your ...

Erik van Klinken 2 days ago

Expert Talks

AI Integrity: The Invisible Threat Organizations Can’t Ignore

AI Integrity: The Invisible Threat Organizations Can’t Ignore

AI systems are increasingly making decisions that impact people, proc...

Three Ways Secure Modern Networks Unlock the True Power of AI

Three Ways Secure Modern Networks Unlock the True Power of AI

AI is rapidly becoming the main driver of innovation for businesses, ...

Data Governance in the Cloud: Balancing Innovation and Regulation

The cloud has become the backbone of modern business, enabling rapid ...

How to Safeguard and Prepare Exchange Server against Natural Disasters?

It is critical to make sure that the Exchange Server is protected fro...

Tech calendar

Discover Why Northern Europe Chooses Redgate Monitor

November 13, 2025

Dell Technologies Forum

November 13, 2025 Nieuwegein

BrickCon The Databricks Community Conference

December 3, 2025 Orlando, Florida

Appdevcon

March 10, 2026 Amsterdam

Webdevcon

March 10, 2026 Amsterdam

Dutch PHP Conference

March 10, 2026 Amsterdam

Whitepapers

Experience Synology’s latest enterprise backup solution

Experience Synology’s latest enterprise backup solution

How do you ensure your company data is both secure and quickly recove...

How to choose the right Enterprise Linux platform?

How to choose the right Enterprise Linux platform?

"A Buyer's Guide to Enterprise Linux" comprehensively analyzes the mo...

Enhance your data protection strategy for 2025

The Data Protection Guide 2025 explores the essential strategies and...

Strengthen your cybersecurity with DNS best practices

The white paper "DNS Best Practices" by Infoblox presents essential g...

Techzine Global

Techzine focusses on IT professionals and business decision makers by publishing the latest IT news and background stories. The goal is to help IT professionals get acquainted with new innovative products and services, but also to offer in-depth information to help them understand products and services better.

Follow us

Twitter
LinkedIn
YouTube

© 2025 Dolphin Publications B.V.
All rights reserved.

Techzine Service

  • Become a partner
  • Advertising
  • About Us
  • Contact
  • Terms & Conditions
  • Privacy Statement