Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Google Security Technology

Google Apps Gets Two-Factor Security 118

judgecorp writes "Passwords alone are not enough to secure access. Many organisations require two-factor authentication with a token. Google just added free two-factor verification to Google Apps, sending a one-off token to the user's mobile phone. It's good to have this for free, and it backs up Google's assertion that cloud apps are more secure — but it doesn't answer how it helps if an intruder is getting into Apps through a lost or stolen phone."
This discussion has been archived. No new comments can be posted.

Google Apps Gets Two-Factor Security

Comments Filter:
  • by Anonymous Coward on Monday September 20, 2010 @09:01AM (#33634624)

    Or you know, a Google (or any other cloud service) employee [slashdot.org] access all your data because they own it then... No, cloud services are not more secure. Especially free ones who's business model is to make money off your private information.

  • There's a price. (Score:5, Insightful)

    by Anonymous Coward on Monday September 20, 2010 @09:02AM (#33634626)

    For the low low price of your mobile phone number we will give you some extra security!

  • by Anonymous Coward on Monday September 20, 2010 @09:04AM (#33634632)

    I'm not sure that necessarily makes your data less secure. An administrator always has access to your data, whether that admin works for your company or another company doesn't necessarily change the likelihood that the admin will abuse their power.

  • by Pojut ( 1027544 ) on Monday September 20, 2010 @09:06AM (#33634656) Homepage

    Agreed. I fail to see how sensitive information being sent over the Internet could be more secure than keeping sensitive information stored on a computer that doesn't even have a network card installed.

  • by chill ( 34294 ) on Monday September 20, 2010 @09:09AM (#33634686) Journal

    Allow me to introduce you to Google's "I lost my password, send me a code to my mobile phone to reset it" feature...

  • by NYMeatball ( 1635689 ) on Monday September 20, 2010 @09:10AM (#33634690)

    It sort of compromises everything - but that doesn't mean it's a bad form of authentication, does it?

    Once your machine, token, credentials, anything have been physically compromised, it's generally accepted that you're hosed (at least for that one factor).

    Seems like a step in the right direction.

  • by MBGMorden ( 803437 ) on Monday September 20, 2010 @09:13AM (#33634714)

    I believe that's via email, which can be tied to your phone, but not necessarily.

    The reality though is that the only completely secure system is one that NO ONE can access. If you want it to be useful, the system HAS to have some way to unlock itself. Saying that a person can access the system if they have all of your credentials isn't really a flaw - it's the way the system has to work.

    Put bluntly, there has to be SOME point when the user steps up and starts becoming responsible for keeping track of their credentials.

  • by ibsteve2u ( 1184603 ) on Monday September 20, 2010 @09:13AM (#33634718)
    The most interesting inference to me is that some third-party vendor who is serving up cloud apps has employees who are inherently more trustworthy than the ones you handpicked are.
  • Silly nerds... (Score:4, Insightful)

    by Darkness404 ( 1287218 ) on Monday September 20, 2010 @09:13AM (#33634720)

    but it doesn't answer how it helps if an intruder is getting into Apps through a lost or stolen phone

    When you lose your phone, the vast, vast, vast, vast majority of the time they just want to wipe your iPhone and sell it to the local pawn shop. They don't care about your data, your songs, your apps, etc. they simply see that shiny, new hardware = money. Same thing with laptops, they don't care about the data on it, they want to wipe "that funny looking OS" off of it and put a pirated copy of XP on there and sell it on eBay.

    The idea that stolen gadgets are going to be used for something beyond simple hardware really overestimates either your value of data or the intelligence of thieves.

  • Re:It's Obvious (Score:3, Insightful)

    by eldavojohn ( 898314 ) * <`eldavojohn' `at' `gmail.com'> on Monday September 20, 2010 @09:17AM (#33634740) Journal

    Learn to keep track of your damn phone...

    And what do I do when I don't have phone service?

    I recently went on vacation to Grand Cayman and didn't have any phone service. What happens then? I had to correctly identify friends from random Facebook pictures in order to log into Facebook the first time (at which point the place I was staying was apparently white listed for me to log into for the rest of the trip).

    Sure, it's probably a small annoyance to pay for better security unless you travel often or have really randomly spotty cell phone service. A trip out to my parent's farm would probably be more than an annoyance as I await the text msg okaying me to log into GMail through my parent's 56k modem. I guess everything comes with a price but I'd probably just turn this off and leave it off instead of regretting it on vacation if I forget to disable it before traveling.

    Also, a few of my company's clients have server rooms in the depths of basements with little to no cell phone reception. Would hate to work there if you try to log into GMail and get asked for this. You'd have to go for a walk to get your authentication code.

  • by thethibs ( 882667 ) on Monday September 20, 2010 @09:17AM (#33634742) Homepage

    but it doesn't answer how it helps if ...

    Judgecorp should wait until after second coffee to post.

    What happens when an attacker has both factors in a two-factor situation is that security is breached. The same applies for any number of factors.

    The objective is to improve security, nothing can guarantee it. No "answer" is needed.

    (.....)

  • by Anonymous Coward on Monday September 20, 2010 @09:17AM (#33634744)

    It appears Google's argument is "it's safer/easier/cheaper to use Google Docs than emailing your file as an attachment, or letting employees put it on laptops and USB keys which they then loose."

    If you have information which can only be transmitted between a computer monitor and the user's eyeballs, I don't think Google has any thing to peddle to your corporation, unless they start selling Faraday Cages to guard against Van Eck phreaking.

  • Re:Mobile security (Score:3, Insightful)

    by Mr_Silver ( 213637 ) on Monday September 20, 2010 @09:27AM (#33634868)

    I've never had an email account hacked before, so I'm pretty convinced that some phone app has leaked my account details (as it's the gmail account tethered to my phone).

    The problem is that when you install an application, Android gives you a big long list of things that the app wants to do. Whilst it sounds like a great idea, it gives no context as to why it needs those features and you only have two choices - accept that the application can do everything or don't install it. It's far too easy to sneak something into that list without people realising.

    In the future, the OS should prompt the user that an application wants to do something (eg. accessing your address book) at the point it wants to do it and let the use decide whether or not to allow it - with an option to say "Always do this for [blah]" where [blah] could be "accessing contacts". It has the nice side effect of forcing application developers to design an UI which tells customers what they are trying to do so that they don't hit the "Deny" button as soon as the alert appears.

    That way, people can run applications, test them and even use them without having to subject all their data to the mercy of the developers.

  • by Jurily ( 900488 ) <(jurily) (at) (gmail.com)> on Monday September 20, 2010 @09:31AM (#33634908)

    Agreed. While it's by no means perfect, it is more secure.

    Most accounts today are not compromised because the attackers specifically target the victim, but because they had the weakest password.

    Also, the act of stealing a physical device makes it a far greater risk and hassle for the attackers.

  • by IndustrialComplex ( 975015 ) on Monday September 20, 2010 @09:55AM (#33635086)

    Agreed. I fail to see how sensitive information being sent over the Internet could be more secure than keeping sensitive information stored on a computer that doesn't even have a network card installed.

    Security and Availability go hand in hand. Security isn't just, NO ONE EVER GETS TO LOOK AT MY DATA. Security is also making sure that your data remains undamaged (integrity) and available to the people that you want to see it.

  • by IndustrialComplex ( 975015 ) on Monday September 20, 2010 @09:58AM (#33635108)

    Google, in turn, has a vested interest in ensuring that their paying customers' data stays private.

    Google has a vested interest in ensuring that their paying customers' data breaches stay private. That's number one. If they can't ensure number one, then your statement takes priority.

    The issue with Google's model is that you rely on Google's policy/process and you cannot directly negotiate/control that. (Not saying that their policy/process isn't acceptable for some people, but that you don't get to directly influence it)

  • Re:Mobile security (Score:3, Insightful)

    by N1AK ( 864906 ) on Monday September 20, 2010 @10:04AM (#33635152) Homepage

    I agree, really, Google should let -us- decide what an app can do.

    Google won't, and shouldn't, add that. Google doesn't know what an application needs to function, a lot of users will block internet/phone etc access and break the application. Google and the app developer will then get bombarded by complaints and help requests. Android will need to match or beat iOS in user friendliness, options that offer nothing to most users and cause negative user experiences aren't going to help do that.

    I would like this functionality, even though I would rarely use it. I just don't think it would benefit Android in general.

  • by morgan_greywolf ( 835522 ) on Monday September 20, 2010 @11:34AM (#33636564) Homepage Journal

    The only kind of "private" e-mail that exists is the kind that you encrypt. Once a plaintext e-mail leaves your client, there is no guarantee that some third party won't read it.

    Security through obscurity is the same as no security at all.

Always try to do things in chronological order; it's less confusing that way.

Working...