By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Here’s how you can protect your Google account from attacks
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Mobile > Here’s how you can protect your Google account from attacks
Mobile

Here’s how you can protect your Google account from attacks

News Room
Last updated: 2025/10/25 at 8:07 AM
News Room Published 25 October 2025
Share
SHARE

Attacks no longer just look for a password: they directly attack the smartphone and the mechanisms that protect it. “Pixnapping” spotted by American researchers can thus steal a double authentication code in around thirty seconds, without the victim realizing it.

Login without password

This is a disaster scenario when we know that attacks targeting Google services have increased by 84% in one year. Sophisticated phishing, voice deepfakes and automated messaging campaigns — tools increasingly used by hackers — are making traditional protections less effective. Faced with this observation, Google recognizes the limits of traditional backup methods, such as recovery SMS or secondary email addresses. Notably ” if you lost your phone or didn’t update your emergency number “, admit Claire Forszt and Sriram Karra, from the search engine’s Identity and Engagement team. The message is to prepare the ground before the breakdown.

Among the new options, Restore Contacts allows you to designate up to ten trusted people (family, close friends) who can help verify your identity and unblock access to a compromised Gmail account. Google presents this option as “ a simple and safe way to turn to people you trust when other recovery solutions are not available “. Important: you must configure these contacts before losing access to your account.

Another new feature designed to reduce dependence on passwords: “Log in with phone number”. On Android, entering your number will bring up the associated accounts; after validation by the screen lock code, the user regains access without a password. Eugene Liderman, director of Android security and privacy, says the rollout is gradual “ worldwide “. The idea is to replace a fragile step (the password) with verification attached to the phone, provided the device is still under your control.

Google is also strengthening Messages, an app that serves as a frequent vector of malicious links: the messaging service will warn and block access to suspicious links until explicit confirmation. Key Verifier, the QR code verification tool, adds a layer to ensure that encrypted conversations are with the right person.

Finally, the web giant is focusing on education: the interactive game “Be Scam Ready” trains users to recognize scams, while partnerships (AARP, National Cybersecurity Alliance) aim to protect vulnerable populations, particularly seniors. Google is also hosting workshops during Cybersecurity Awareness Month.

🟣 To not miss any news on the WorldOfSoftware, subscribe on Google News and on our WhatsApp. And if you love us, .

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article AWS Launches EC2 Capacity Manager for Centralized, Cross-Account Capacity Optimization
Next Article For the first time in history there are mosquitoes in Iceland. And it was assumed that they couldn’t get there
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

These 6 Soundbars Are the Best of October 2025
News
Lenovo IdeaCentre Mini x Review: This Snapdragon PC Needs a Deal for Real Appeal
News
What does nearly $6,000 of gaming laptop get you?
News
Netflix top 10 movies — here’s the 3 worth watching right now
News

You Might also Like

Mobile

learn to comply in one step

3 Min Read
Mobile

The development of digital talent is key to European sovereignty

8 Min Read
Mobile

Here’s What The Latest Leak Reveals

3 Min Read
Mobile

For the first time in history there are mosquitoes in Iceland. And it was assumed that they couldn’t get there

4 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?