Security Blog
The latest news and insights from Google on security and safety on the Internet
An improved Google Authenticator app to celebrate millions of 2-step verification users
30. ožujka 2012.
Posted by Sara "Scout" Sinclair, Associate Product Manager, Google Security Team
Since we first made 2-step verification available to
all Google users
in February of 2011, millions of people around the world have chosen to use this extra layer of security to protect their Google Accounts. Thousands more are signing up every day. And recently, we updated the feature’s companion smartphone app,
Google Authenticator
, for Android users.
2-step verification works by requiring users to enter a verification code when signing in using a computer they haven’t previously marked as “
trusted
.” Many users choose to receive their codes via SMS or voice call, but smartphone users also have the option to generate codes on their phone by
installing the Google Authenticator app
— an option that is particularly useful while traveling, or where cellular coverage is unreliable. You can use Google Authenticator to generate a valid code even when your phone isn’t connected to a cellular or data network.
We want 2-step verification to be simple to use, and therefore we are working continually to make it easier for users to sign up, manage their settings, and maintain easy access to their verification codes at any time and from anywhere. Our updated Google Authenticator app has an improved look-and-feel, as well as fundamental upgrades to the back-end security and infrastructure that necessitated the migration to a new app. Future improvements, however, will use the familiar Android update procedure.
Current Google Authenticator users will be prompted to upgrade to the new version when they launch the app. We’ve worked hard to make the upgrade process as smooth as possible, but if you have questions please refer to the
Help Center article
for more information. And, if you aren’t already a 2-step verification user, we encourage you to
give it a try
.
Oznake
#sharethemicincyber
#supplychain #security #opensource
AI Security
android
android security
android tr
app security
big data
biometrics
blackhat
C++
chrome
chrome enterprise
chrome security
connected devices
CTF
diversity
encryption
federated learning
fuzzing
Gboard
google play
google play protect
hacking
interoperability
iot security
kubernetes
linux kernel
memory safety
Open Source
pha family highlights
pixel
privacy
private compute core
Rowhammer
rust
Security
security rewards program
sigstore
spyware
supply chain
targeted spyware
tensor
Titan M2
VDP
vulnerabilities
workshop
Archive
2026
velj
sij
2025
pro
stu
lis
ruj
kol
srp
lip
svi
tra
ožu
velj
sij
2024
pro
stu
lis
ruj
kol
srp
lip
svi
tra
ožu
velj
sij
2023
pro
stu
lis
ruj
kol
srp
lip
svi
tra
ožu
velj
sij
2022
pro
stu
lis
ruj
kol
srp
lip
svi
tra
ožu
velj
sij
2021
pro
stu
lis
ruj
kol
srp
lip
svi
tra
ožu
velj
sij
2020
pro
stu
lis
ruj
kol
srp
lip
svi
tra
ožu
velj
sij
2019
pro
stu
lis
ruj
kol
srp
lip
svi
tra
ožu
velj
sij
2018
pro
stu
lis
ruj
kol
srp
lip
svi
tra
ožu
velj
sij
2017
pro
stu
lis
ruj
srp
lip
svi
tra
ožu
velj
sij
2016
pro
stu
lis
ruj
kol
srp
lip
svi
tra
ožu
velj
sij
2015
pro
stu
lis
ruj
kol
srp
lip
svi
tra
ožu
velj
sij
2014
pro
stu
lis
ruj
kol
srp
lip
tra
ožu
velj
sij
2013
pro
stu
lis
kol
lip
svi
tra
ožu
velj
sij
2012
pro
ruj
kol
lip
svi
tra
ožu
velj
sij
2011
pro
stu
lis
ruj
kol
srp
lip
svi
tra
ožu
velj
2010
stu
lis
ruj
kol
srp
svi
tra
ožu
2009
stu
lis
kol
srp
lip
ožu
2008
pro
stu
lis
kol
srp
svi
velj
2007
stu
lis
ruj
srp
lip
svi
Feed
Follow @google
Follow
Give us feedback in our
Product Forums
.