• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Home
  • About
  • Structure
  • Gradebook

ITACS 5211: Introduction to Ethical Hacking

Wade Mackey

Google’s Titan security key

September 16, 2018 by Satwika Balakrishnan 3 Comments

https://techcrunch.com/2018/08/30/this-is-googles-titan-security-key/

Google has launched its in-house security key that adds an extra layer of security by requiring you to touch them in order to log into applications. Google has named it as ‘Titan Security Keys’ and it comes with a USB key as well as a Bluetooth key. Google claims that these keys will enhance protection against phishing and that it will provide high value to users such as IT admins.

However, the downside here is that if you lose these keys, you lose everything.

Filed Under: Week 03: Reconnaisance Tagged With:

Reader Interactions

Comments

  1. Sev Shirozian says

    September 16, 2018 at 10:23 pm

    This is a cool little security tool but what if your USB ports are disabled or if you don’t allow Bluetooth on the laptop. The key might not be useful then. You might have to use some kind of control software that only allows a certain type of USB device to work. Also you might be out of luck if you lose your key! They give you two keys so you can use the backup key when you need it, but the recovery process could take days.

    Sev Shirozian

    Log in to Reply
    • Satwika Balakrishnan says

      September 18, 2018 at 4:00 pm

      Yes, you are right. This may not be useful when there are restrictions regarding USB devices and Bluetooth devices,

      Log in to Reply
  2. Yingyan Wang says

    September 18, 2018 at 7:08 pm

    Last week I posted another article about Reddit, which was hacked even using SMS-based two-factor authentication method, and that article indicated that hardware-based security key would be a better way to protect information since SMS messages are easier to be intercepted. And Google’s Titan security key is the example of a hardware-based security key offering two-factor authentication for information protection against phishing attacks. I think it has advantages in some aspects but also should pay attention to the lost or stolen incidents and other associated risks.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Uncategorized (14)
  • Week 01: Overview (7)
  • Week 02: TCP/IP and Network Architecture (18)
  • Week 03: Reconnaisance (17)
  • Week 04: Vulnerability Scanning (19)
  • Week 05: System and User Enumeration (17)
  • Week 06: Sniffers (17)
  • Week 07: NetCat and HellCat (15)
  • Week 08: Social Engineering, Encoding and Encryption (21)
  • Week 09: Malware (14)
  • Week 10: Web Application Hacking (17)
  • Week 11: SQL Injection (15)
  • Week 12: Web Services (25)
  • Week 13: Evasion Techniques (8)
  • Week 14: Review of all topics (15)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in