CINXE.COM
Official Google Blog: security
<!DOCTYPE html> <html class='v2 list-page' dir='ltr' itemscope='' itemtype='http://schema.org/Blog' lang='en' xmlns='http://www.w3.org/1999/xhtml' xmlns:b='http://www.google.com/2005/gml/b' xmlns:data='http://www.google.com/2005/gml/data' xmlns:expr='http://www.google.com/2005/gml/expr'> <head> <link href='https://www.blogger.com/static/v1/widgets/3566091532-css_bundle_v2.css' rel='stylesheet' type='text/css'/> <!-- Google tag (gtag.js) --> <script async='async' src='https://www.googletagmanager.com/gtag/js?id=G-2PXZD4EB4F'></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-2PXZD4EB4F'); </script> <title> Official Google Blog: security </title> <meta content='width=device-width, height=device-height, minimum-scale=1.0, initial-scale=1.0, user-scalable=0' name='viewport'/> <meta content='IE=Edge' http-equiv='X-UA-Compatible'/> <meta content='Official Google Blog' property='og:title'/> <meta content='https://2.bp.blogspot.com/-kptChpiuaf0/VeSjz-zMUzI/AAAAAAAAAxE/REIiZ4qVI2s/s1600/150824_GoogleBlog_Share.png' property='og:image'/> <meta content='Insights from Googlers into our products, technology, and the Google culture' property='og:description'/> <meta content='en_US' property='og:locale'/> <meta content='https://googleblog.blogspot.com/search/label/security' property='og:url'/> <meta content='Official Google Blog' property='og:site_name'/> <!-- Twitter Card properties --> <meta content='Official Google Blog' property='og:title'/> <meta content='Insights from Googlers into our products, technology, and the Google culture' property='twitter:description'/> <meta content='summary' name='twitter:card'/> <meta content='@google' name='twitter:creator'/> <link href='https://fonts.googleapis.com/css?family=Roboto:400italic,400,500,500italic,700,700italic' rel='stylesheet' type='text/css'/> <link href='https://fonts.googleapis.com/icon?family=Material+Icons' rel='stylesheet'/> <script src='https://ajax.googleapis.com/ajax/libs/jquery/1.11.3/jquery.min.js' type='text/javascript'></script> <!-- End --> <style id='page-skin-1' type='text/css'><!-- /* <Group description="Header Color" selector="header"> <Variable name="header.background.color" description="Header Background" type="color" default="#ffffff"/> </Group> */ .header-outer { border-bottom: 1px solid #e0e0e0; background: #ffffff; } html, .Label h2, #sidebar .rss a, .BlogArchive h2, .FollowByEmail h2.title, .widget .post h2 { font-family: Roboto, sans-serif; } .plusfollowers h2.title, .post h2.title, .widget h2.title { font-family: Roboto, sans-serif; } .widget-item-control { height: 100%; } .widget.Header, #header { position: relative; height: 100%; width: 100%; } } .widget.Header .header-logo1 { float: left; margin-right: 15px; padding-right: 15px; border-right: 1px solid #ddd; } .widget.Header .header-title h2 { font-size: 24px; font-family: Roboto, sans-serif; font-weight: normal; line-height: 32px; margin-bottom: 7px; } .header-inner { background-repeat: no-repeat; background-position: right 0px; } .post-author, .byline-author { font-size: 14px; font-weight: normal; color: #757575; color: rgba(0,0,0,.54); } .post-content .img-border { border: 1px solid rgb(235, 235, 235); padding: 4px; } .header-title a { text-decoration: none !important; } pre { border: 1px solid #bbbbbb; margin-top: 1em 0 0 0; padding: 0.99em; overflow-x: auto; overflow-y: auto; } pre, code { font-size: 9pt; background-color: #fafafa; line-height: 125%; font-family: monospace; } pre, code { color: #060; font: 13px/1.54 "courier new",courier,monospace; } .header-left .header-logo1 { width: 128px !important; } .header-desc { line-height: 20px; margin-bottom: 4px; max-width: 260px; } .fb-custom img, .twitter-custom img, .gplus-share img { cursor: pointer; opacity: 0.54; } .fb-custom img:hover, .twitter-custom img:hover, .gplus-share img:hover { opacity: 0.87; } .fb-like { width: 80px; } .post .share { float: right; } #twitter-share{ border: #CCC solid 1px; border-radius: 3px; background-image: -webkit-linear-gradient(top,#ffffff,#dedede); } .twitter-follow { background: url(https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhVow5xT-XpfkrhZ9UiGEhjZwj6dJBx5VcUQgpVb0AbTGo4PU2N6E24naS7FE6ihn-p5-2H90fVeYJ_qZDiOw_bs9u_tT_x-_PUo5secViHpshyphenhyphenvg1opdRwIuTPM_hfsOTCunnAuQ/s1600/twitter-bird.png) no-repeat left center; padding-left: 18px; font: normal normal normal 11px/18px 'Helvetica Neue',Arial,sans-serif; font-weight: bold; text-shadow: 0 1px 0 rgba(255,255,255,.5); cursor: pointer; margin-bottom: 10px; } .twitter-fb { padding-top: 2px; } .fb-follow-button { background: -webkit-linear-gradient(#4c69ba, #3b55a0); background: -moz-linear-gradient(#4c69ba, #3b55a0); background: linear-gradient(#4c69ba, #3b55a0); border-radius: 2px; height: 18px; padding: 4px 0 0 3px; width: 57px; border: #4c69ba solid 1px; } .fb-follow-button a { text-decoration: none !important; text-shadow: 0 -1px 0 #354c8c; text-align: center; white-space: nowrap; font-size: 11px; color: white; vertical-align: top; } .fb-follow-button a:visited { color: white; } .fb-follow { padding: 0px 5px 3px 0px; width: 14px; vertical-align: bottom; } .gplus-wrapper { margin-top: 3px; display: inline-block; vertical-align: top; } .twitter-custom, .gplus-share { margin-right: 12px; } .fb-follow-button{ margin: 10px auto; } /** CUSTOM CODE **/ --></style> <style id='template-skin-1' type='text/css'><!-- .header-outer { clear: both; } .header-inner { margin: auto; padding: 0px; } .footer-outer { background: #f5f5f5; clear: both; margin: 0; } .footer-inner { margin: auto; padding: 0px; } .footer-inner-2 { /* Account for right hand column elasticity. */ max-width: calc(100% - 248px); } .google-footer-outer { clear: both; } .cols-wrapper, .google-footer-outer, .footer-inner, .header-inner { max-width: 978px; margin-left: auto; margin-right: auto; } .cols-wrapper { margin: auto; clear: both; margin-top: 60px; margin-bottom: 60px; overflow: hidden; } .col-main-wrapper { float: left; width: 100%; } .col-main { margin-right: 278px; max-width: 660px; } .col-right { float: right; width: 248px; margin-left: -278px; } /* Tweaks for layout mode. */ body#layout .google-footer-outer { display: none; } body#layout .header-outer, body#layout .footer-outer { background: none; } body#layout .header-inner { height: initial; } body#layout .cols-wrapper { margin-top: initial; margin-bottom: initial; } --></style> <!-- start all head --> <meta content='text/html; charset=UTF-8' http-equiv='Content-Type'/> <meta content='blogger' name='generator'/> <link href='https://googleblog.blogspot.com/favicon.ico' rel='icon' type='image/x-icon'/> <link href='https://googleblog.blogspot.com/search/label/security' rel='canonical'/> <link rel="alternate" type="application/atom+xml" title="Official Google Blog - Atom" href="https://googleblog.blogspot.com/feeds/posts/default" /> <link rel="alternate" type="application/rss+xml" title="Official Google Blog - RSS" href="https://googleblog.blogspot.com/feeds/posts/default?alt=rss" /> <link rel="service.post" type="application/atom+xml" title="Official Google Blog - Atom" href="https://www.blogger.com/feeds/10861780/posts/default" /> <!--Can't find substitution for tag [blog.ieCssRetrofitLinks]--> <meta content='Insights from Googlers into our products, technology, and the Google culture' name='description'/> <meta content='https://googleblog.blogspot.com/search/label/security' property='og:url'/> <meta content='Official Google Blog' property='og:title'/> <meta content='Insights from Googlers into our products, technology, and the Google culture' property='og:description'/> <!-- end all head --> <base target='_self'/> <style> html { font-family: Roboto, sans-serif; -moz-osx-font-smoothing: grayscale; -webkit-font-smoothing: antialiased; } body { padding: 0; /* This ensures that the scroll bar is always present, which is needed */ /* because content render happens after page load; otherwise the header */ /* would "bounce" in-between states. */ min-height: 150%; } .butter-bar { background-color: #fce8b2; font-size: 16px; margin-bottom: 0; padding: 15px !important; text-align: center; } h2 { font-size: 16px; } h1, h2, h3, h4, h5 { line-height: 2em; } html, h4, h5, h6 { font-size: 14px; } a, a:visited { color: #4184F3; text-decoration: none; } a:focus, a:hover, a:active { text-decoration: none; } .Header { margin-top: 15px; } .Header h1 { font-size: 32px; font-weight: 300; line-height: 32px; height: 42px; } .header-inner .Header .titlewrapper { padding: 0; margin-top: 30px; } .header-inner .Header .descriptionwrapper { padding: 0; margin: 0; } .cols-wrapper { margin-top: 56px; } .header-outer, .cols-wrapper, .footer-outer, .google-footer-outer { padding: 0 60px; } .header-inner { height: 256px; position: relative; } html, .header-inner a { color: #212121; color: rgba(0,0,0,.87); } .header-inner .google-logo { position: absolute; background-size: contain; z-index: 1; } .header-left { position: absolute; left: 330px; top: 92px; } .google-logo { top: 94px; } #google-footer { position: relative; font-size: 13px; list-style: none; text-align: right; } #google-footer a { color: #444; } #google-footer ul { margin: 0; padding: 0; height: 144px; line-height: 144px; } #google-footer ul li { display: inline; } #google-footer ul li:before { color: #999; content: "\00b7"; font-weight: bold; margin: 5px; } #google-footer ul li:first-child:before { content: ''; } #google-footer .google-logo-dark { left: 0; margin-top: -16px; position: absolute; top: 50%; } /** Sitemap links. **/ .footer-inner-2 { font-size: 14px; padding-top: 42px; padding-bottom: 74px; } .footer-inner-2 .HTML h2 { color: #212121; color: rgba(0,0,0,.87); font-size: 14px; font-weight: 500; padding-left: 0; margin: 10px 0; } .footer-inner-2 .HTML ul { font-weight: normal; list-style: none; padding-left: 0; } .footer-inner-2 .HTML li { line-height: 24px; padding: 0; } .footer-inner-2 li a { color: rgba(65,132,243,.87); } /** Archive widget. **/ .BlogArchive { font-size: 13px; font-weight: normal; } .BlogArchive .widget-content { display: none; } .BlogArchive h2, .Label h2 { color: #4184F3; text-decoration: none; } .BlogArchive .hierarchy li { display: inline-block; } /* Specificity needed here to override widget CSS defaults. */ .BlogArchive #ArchiveList ul li, .BlogArchive #ArchiveList ul ul li { margin: 0; padding-left: 0; text-indent: 0; } .BlogArchive .intervalToggle { cursor: pointer; } .BlogArchive .expanded .intervalToggle .new-toggle { -ms-transform: rotate(180deg); transform: rotate(180deg); } .BlogArchive .new-toggle { float: right; padding-top: 3px; opacity: 0.87; } #ArchiveList { text-transform: uppercase; } #ArchiveList .expanded > ul:last-child { margin-bottom: 16px; } #ArchiveList .archivedate { width: 100%; } /* Months */ .BlogArchive .items { max-width: 150px; margin-left: -4px; } .BlogArchive .expanded .items { margin-bottom: 10px; overflow: hidden; } .BlogArchive .items > ul { float: left; height: 32px; } .BlogArchive .items a { padding: 0 4px; } .Label { font-size: 13px; font-weight: normal; } .sidebar-icon { display: inline-block; width: 24px; height: 24px; vertical-align: middle; margin-right: 12px; margin-top: -1px } .Label a { margin-right: 4px; } .Label .widget-content { display: none; } .FollowByEmail { font-size: 13px; font-weight: normal; } .FollowByEmail h2 { background: url("data:image/png;base64,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"); background-repeat: no-repeat; background-position: 0 50%; text-indent: 30px; } .FollowByEmail .widget-content { display: none; } .searchBox input { border: 1px solid #eee; color: #212121; color: rgba(0,0,0,.87); font-size: 14px; padding: 8px 8px 8px 40px; width: 164px; font-family: Roboto, sans-serif; background: url("https://www.gstatic.com/images/icons/material/system/1x/search_grey600_24dp.png") 8px center no-repeat; } .searchBox ::-webkit-input-placeholder { /* WebKit, Blink, Edge */ color: rgba(0,0,0,.54); } .searchBox :-moz-placeholder { /* Mozilla Firefox 4 to 18 */ color: #000; opacity: 0.54; } .searchBox ::-moz-placeholder { /* Mozilla Firefox 19+ */ color: #000; opacity: 0.54; } .searchBox :-ms-input-placeholder { /* Internet Explorer 10-11 */ color: #757575; } .widget-item-control { margin-top: 0px; } .section { margin: 0; padding: 0; } #sidebar-top { border: 1px solid #eee; } #sidebar-top > div { margin: 16px 0; } .widget ul { line-height: 1.6; } /*main post*/ .post { margin-bottom:30px; } #main .post .title { margin: 0; } #main .post .title a { color: #212121; color: rgba(0,0,0,.87); font-weight: normal; font-size: 24px; } #main .post .title a:hover { text-decoration:none; color:#4184F3; } .message, #main .post .post-header { margin: 0; padding: 0; } #main .post .post-header .caption, #main .post .post-header .labels-caption, #main .post .post-footer .caption, #main .post .post-footer .labels-caption { color: #444; font-weight: 500; } #main .tr-caption-container td { text-align: left; } #main .post .tr-caption { color: #757575; color: rgba(0,0,0,.54); display: block; max-width: 560px; padding-bottom: 20px; } #main .post .tr-caption-container { line-height: 24px; margin: -1px 0 0 0 !important; padding: 4px 0; text-align: left; } #main .post .post-header .published{ font-size:11px; font-weight:bold; } .post-header .publishdate { font-size: 17px; font-weight:normal; color: #757575; color: rgba(0,0,0,.54); } #main .post .post-footer{ font-size:12px; padding-bottom: 21px; } .label-footer { margin-bottom: 12px; margin-top: 12px; } .comment-img { margin-right: 16px; opacity: 0.54; vertical-align: middle; } #main .post .post-header .published { margin-bottom: 40px; margin-top: -2px; } .post .post-content { color: #212121; color: rgba(0,0,0,.87); font-size: 17px; margin: 25px 0 36px 0; line-height: 32px; word-wrap: break-word; } .post-body .post-content ul, .post-body .post-content ol { margin: 16px 0; padding: 0 48px; } .post-summary { display: none; } /* Another old-style caption. */ .post-content div i, .post-content div + i { font-size: 14px; font-style: normal; color: #757575; color: rgba(0,0,0,.54); display: block; line-height: 24px; margin-bottom: 16px; text-align: left; } /* Another old-style caption (with link) */ .post-content a > i { color: #4184F3 !important; } /* Old-style captions for images. */ .post-content .separator + div:not(.separator) { margin-top: -16px; } /* Capture section headers. */ .post-content br + br + b, .post-content .space + .space + b, .post-content .separator + b { display: inline-block; margin-bottom: 8px; margin-top: 24px; } .post-content li { line-height: 32px; } /* Override all post images/videos to left align. */ .post-content .separator, .post-content > div { text-align: left; } .post-content .separator > a, .post-content .separator > span { margin-left: 0 !important; } .post-content img { max-width: 100%; height: auto; width: auto; } .post-content .tr-caption-container img { margin-bottom: 12px; } .post-content iframe, .post-content embed { max-width: 100%; } .post-content .carousel-container { margin-bottom: 48px; } #main .post-content b { font-weight: 500; } /* These are the main paragraph spacing tweaks. */ #main .post-content br { content: ' '; display: block; padding: 4px; } .post-content .space { display: block; height: 8px; } .post-content iframe + .space, .post-content iframe + br { padding: 0 !important; } #main .post .jump-link { margin-bottom:10px; } .post-content img, .post-content iframe { margin: 30px 0 20px 0; } .post-content > img:first-child, .post-content > iframe:first-child { margin-top: 0; } .col-right .section { padding: 0 16px; } #aside { background:#fff; border:1px solid #eee; border-top: 0; } #aside .widget { margin:0; } #aside .widget h2, #ArchiveList .toggle + a.post-count-link { color: #212121; color: rgba(0,0,0,.87); font-weight: 400 !important; margin: 0; } #ArchiveList .toggle { float: right; } #ArchiveList .toggle .material-icons { padding-top: 4px; } #sidebar .tab { cursor: pointer; } #sidebar .tab .arrow { display: inline-block; float: right; } #sidebar .tab .icon { display: inline-block; vertical-align: top; height: 24px; width: 24px; margin-right: 13px; margin-left: -1px; margin-top: 1px; color: #757575; color: rgba(0,0,0,.54); } #sidebar .widget-content > :first-child { padding-top: 8px; } #sidebar .active .tab .arrow { -ms-transform: rotate(180deg); transform: rotate(180deg); } #sidebar .arrow { color: #757575; color: rgba(0,0,0,.54); } #sidebar .widget h2 { font-size: 14px; line-height: 24px; display: inline-block; } #sidebar .widget .BlogArchive { padding-bottom: 8px; } #sidebar .widget { border-bottom: 1px solid #eee; box-shadow: 0px 1px 0 white; margin-bottom: 0; padding: 14px 0; min-height: 20px; } #sidebar .widget:last-child { border-bottom: none; box-shadow: none; margin-bottom: 0; } #sidebar ul { margin: 0; padding: 0; } #sidebar ul li { list-style:none; padding:0; } #sidebar ul li a { line-height: 32px; } #sidebar .archive { background-image: url("data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABAAAAAYCAYAAADzoH0MAAAAGXRFWHRTb2Z0d2FyZQBBZG9iZSBJbWFnZVJlYWR5ccllPAAAAE1JREFUeNpiNDY23s9AAWBioBCwYBM8c+YMVsUmJibEGYBNMS5DaeMFfDYSZQA2v9I3FrB5AZeriI4FmnrBccCT8mhmGs1MwyAzAQQYAKEWG9zm9QFEAAAAAElFTkSuQmCC"); height: 24px; line-height: 24px; padding-left: 30px; } #sidebar .labels { background-image: url("data:image/png;base64,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"); height: 20px; line-height: 20px; padding-left: 30px; } #sidebar .rss a { background-image: url("data:image/png;base64,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"); } #sidebar .subscription a { background-image: url("data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABEAAAALCAYAAACZIGYHAAAAGXRFWHRTb2Z0d2FyZQBBZG9iZSBJbWFnZVJlYWR5ccllPAAAAUBJREFUeNrMkSGLAlEUhb+ZB4JFi8mx2cz+ApvhRUGTcUCrNqNJDYIi+DO0GUwmQXDK2DSIoGgZcSaIjDrzwrK4ssvChj1w0733O+fdp+m6PozH4yQSCfb7Pa7r8pOi0SjJZBLP8zgej4gAIMvlMuPxmADIYrHger1+C6lUKmo+NJ/NZojb7SZDWiwWo1qtks1msW2bw+HwZdkwDHq9HvV6nel0SqvVYrvdIh6Ph3Qch+VyqRYLhQJSSjRNw7IsfN9XgGKxSLfbJZfL0e/3aTabrFYr7vc7IujLcOh8PqunrNdr0uk0pVKJVCpFJBJRgEajweVyod1uMxgM2O12BAGUgRbU8DV2JpOhVquRz+cRQii3+XxOp9NRN3jVR5LPOp1OjEYjlSL8hclkgmmabDabt4d+m+S30vkD/R/IU4ABAPTZgnZdmG/PAAAAAElFTkSuQmCC"); } #sidebar-bottom { background: #f5f5f5; border-top:1px solid #eee; } #sidebar-bottom .widget { border-bottom: 1px solid #e0e0e0; padding: 15px 0; text-align: center; } #sidebar-bottom > div:last-child { border-bottom: 0; } #sidebar-bottom .text { line-height: 20px; } /* Home, forward, and backward pagination. */ .blog-pager { border-top : 1px #e0e0e0 solid; padding-top: 10px; margin-top: 15px; text-align: right !important; } #blog-pager { margin-botom: 0; margin-top: -14px; padding: 16px 0 0 0; } #blog-pager a { display: inline-block; } .blog-pager i.disabled { opacity: 0.2 !important; } .blog-pager i { color: black; margin-left: 16px; opacity: 0.54; } .blog-pager i:hover, .blog-pager i:active { opacity: 0.87; } #blog-pager-older-link, #blog-pager-newer-link { float: none; } .gplus-profile { background-color: #fafafa; border: 1px solid #eee; overflow: hidden; width: 212px; } .gplus-profile-inner { margin-left: -1px; margin-top: -1px; } /* Sidebar follow buttons. */ .followgooglewrapper { padding: 12px 0 0 0; } .loading { visibility: hidden; } .detail-page .post-footer .cmt_iframe_holder { padding-top: 40px !important; } /** Desktop **/ @media (max-width: 900px) { .col-right { display: none; } .col-main { margin-right: 0; min-width: initial; } .footer-outer { display: none; } .cols-wrapper { min-width: initial; } .google-footer-outer { background-color: #f5f5f5; } } /** Tablet **/ @media (max-width: 712px) { .header-outer, .cols-wrapper, .footer-outer, .google-footer-outer { padding: 0 40px; } } /* An extra breakpoint to scale down the logo. */ @media (max-width: 600px) { .header-inner .google-logo { top: 32px; margin-top: 0; } .header-inner .google-logo img { height: 56px; width: auto; /* height: auto; width: 188px; */ /* Override any optical adjustments at desktop size. */ top: 0 !important; } .header-left { left: 0; top: inherit; bottom: 24px; } } /** Mobile/small desktop window; also landscape. **/ @media (max-width: 480px), (max-height: 480px) { .header-outer, .cols-wrapper, .footer-outer, .google-footer-outer { padding: 0 16px; } .cols-wrapper { margin-top: 0; } .post-header .publishdate, .post .post-content { font-size: 16px; } .post .post-content { line-height: 28px; margin-bottom: 30px; } .post { margin-top: 30px; } .byline-author { display: block; font-size: 12px; line-height: 24px; margin-top: 6px; } #main .post .title a { font-weight: 500; color: #4c4c4c; color: rgba(0,0,0,.70); } #main .post .post-header { padding-bottom: 12px; } #main .post .post-header .published { margin-bottom: -8px; margin-top: 3px; } .post .read-more { display: block; margin-top: 14px; } .post .tr-caption { font-size: 12px; } #main .post .title a { font-size: 20px; line-height: 30px; } .post-content iframe { /* iframe won't keep aspect ratio when scaled down. */ max-height: 240px; } .post-content .separator img, .post-content .tr-caption-container img, .post-content iframe { margin-left: -16px; max-width: inherit; width: calc(100% + 32px); } .post-content table, .post-content td { width: 100%; } #blog-pager { margin: 0; padding: 16px 0; } /** List page tweaks. **/ .list-page .post-original { display: none; } .list-page .post-summary { display: block; } .list-page .comment-container { display: none; } .list-page #blog-pager { padding-top: 0; border: 0; margin-top: -8px; } .list-page .label-footer { display: none; } .list-page #main .post .post-footer { border-bottom: 1px solid #eee; margin: -16px 0 0 0; padding: 0 0 20px 0; } .list-page .post .share { display: none; } /** Detail page tweaks. **/ .detail-page .post-footer .cmt_iframe_holder { padding-top: 32px !important; } .detail-page .label-footer { margin-bottom: 0; } .detail-page #main .post .post-footer { padding-bottom: 0; } .detail-page #comments { display: none; } } [data-about-pullquote], [data-is-preview], [data-about-syndication] { display: none; } </style> <noscript> <style> .loading { visibility: visible }</style> </noscript> <!-- Google tag (gtag.js) --> <script async='true' src='https://www.googletagmanager.com/gtag/js?id=G-2PXZD4EB4F'></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-2PXZD4EB4F'); </script> <link href='https://www.blogger.com/dyn-css/authorization.css?targetBlogID=10861780&zx=48e51ad2-0651-407a-b13b-e009df814c4a' media='none' onload='if(media!='all')media='all'' rel='stylesheet'/><noscript><link href='https://www.blogger.com/dyn-css/authorization.css?targetBlogID=10861780&zx=48e51ad2-0651-407a-b13b-e009df814c4a' rel='stylesheet'/></noscript> <meta name='google-adsense-platform-account' content='ca-host-pub-1556223355139109'/> <meta name='google-adsense-platform-domain' content='blogspot.com'/> </head> <body> <script type='text/javascript'> //<![CDATA[ var axel = Math.random() + ""; var a = axel * 10000000000000; document.write('<iframe src="https://2542116.fls.doubleclick.net/activityi;src=2542116;type=gblog;cat=googl0;ord=ord=' + a + '?" width="1" height="1" frameborder="0" style="display:none"></iframe>'); //]]> </script> <noscript> <img alt='' height='1' src='https://ad.doubleclick.net/ddm/activity/src=2542116;type=gblog;cat=googl0;ord=1?' width='1'/> </noscript> <!-- Header --> <div class='butter-bar'> Hey—we've moved. Visit <a href='https://www.blog.google/' target='_blank'>The Keyword</a> for all the latest news and stories from Google </div> <div class='header-outer'> <div class='header-inner'> <a class='google-logo' href='https://googleblog.blogspot.com/'> <img height='96' src='https://www.gstatic.com/images/branding/googlelogo/2x/googlelogo_color_284x96dp.png' width='284'/> </a> <div class='section' id='header'><div class='widget Header' data-version='1' id='Header1'> <div class='header-left'> <div class='header-title'> <a href='/.'> <h2> Official Blog </h2> </a> </div> <div class='header-desc'> Insights from Googlers into our products, technology, and the Google culture </div> </div> </div></div> </div> </div> <!-- all content wrapper start --> <div class='cols-wrapper loading'> <div class='col-main-wrapper'> <div class='col-main'> <div class='section' id='main'><div class='widget Blog' data-version='1' id='Blog1'> <div class='post' data-id='369607026889341384' itemscope='' itemtype='http://schema.org/BlogPosting'> <h2 class='title' itemprop='name'> <a href='https://googleblog.blogspot.com/2015/06/privacy-security-tools-improvements.html' itemprop='url' title='Keeping your personal information private and safe—and putting you in control'> Keeping your personal information private and safe—and putting you in control </a> </h2> <div class='post-header'> <div class='published'> <span class='publishdate' itemprop='datePublished'> June 1, 2015 </span> </div> </div> <div class='post-body'> <div class='post-content' itemprop='articleBody'> <script type='text/template'> We've all been there at some point or another…<br /> <i>You just lost your phone and want to wipe your personal information.</i><br /> <i>You attend an event, and you want to share your photos with some people (but not everyone).</i><br /> <i>You hesitate as you download another app that's asking for a lot of information.</i><br /> <br /> Everyday, we make choices that affect our privacy and security online. Most people, however, don’t feel they have the right level of control to make these important decisions. According to a <a href="http://www.pewinternet.org/2015/05/20/americans-attitudes-about-privacy-security-and-surveillance/">recent Pew study</a>, 93 percent of people think it’s important to control access to their personal information, and 90 percent care about the type of information that’s collected about them. But only 9 percent feel they have “a lot” of control over it. We want to change that.<br /> <br /> Google builds simple, powerful privacy and security tools that keep your information safe and put you in control of it. At Google I/O, we <a href="http://android-developers.blogspot.com/2015/05/android-m-developer-preview-tools.html">announced</a> that people will have more control over the information they provide to mobile apps in the M release, the next version of Android. Today, we’re rolling out two significant improvements to our privacy and security tools: a new hub for managing your Google settings called My Account, and a new site that answers important questions about privacy and security on Google.<br /> <br /> <b>Privacy and security controls, all in one place</b><br /> Privacy and security are two sides of the same coin: if your information isn’t secure, it certainly can’t be private. <a href="http://myaccount.google.com/">My Account</a> gives you quick access to the settings and tools that help you safeguard your data, protect your privacy, and decide what information is used to make Google services work better for you. It also provides more context to help you understand your options and make the right choices for you.<br /> <div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgdKDDn5OdNmPmhCy47x37E1THgTS7Xl0y-yhTsPuvlGNKcPDdPTkumyqxQ2ROHQYbnkFbClVXOsudOamhKdxCnPdRJkNHObjIXmkd7VKN2mxYoZ097YlqHjzHoLhMKiGWOlQp3/s1600/AC_Home_US+%25281%2529.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="360" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgdKDDn5OdNmPmhCy47x37E1THgTS7Xl0y-yhTsPuvlGNKcPDdPTkumyqxQ2ROHQYbnkFbClVXOsudOamhKdxCnPdRJkNHObjIXmkd7VKN2mxYoZ097YlqHjzHoLhMKiGWOlQp3/s640/AC_Home_US+%25281%2529.jpg" width="640" /></a></div>Here are some of the things you can do with My Account:<br /> <br /> <ul><li>Take the <a href="https://myaccount.google.com/privacycheckup">Privacy Checkup</a> and <a href="https://security.google.com/settings/security/secureaccount">Security Checkup</a>, our simple, step-by-step guides through your most important privacy and security settings.</li> <li>Manage the information that can be used from Search, Maps, YouTube and other products to enhance your experience on Google. For example, you can turn on and off settings such as Web and App Activity, which gets you more relevant, faster search results, or Location History, which enables Google Maps and Now to give you tips for a faster commute back home.</li> <li>Use the Ads Settings tool to control ads based on your interests and the searches you’ve done.</li> <li>Control which apps and sites are connected to your account.</li> </ul>We built My Account to be a resource for everyone, even if you don't have a Google Account. Check out your controls at <a href="http://myaccount.google.com/">myaccount.google.com</a>.<br /> <br /> <b>Answering your questions about privacy and security </b><br /> We listen to feedback from people around the world to better understand their concerns about privacy and security. In addition to My Account, we want to help people find answers to common questions on these topics, such as: "What data does Google collect? What does Google do with the data it collects? What tools do I have to control my Google experience?" <br /> <br /> Our new site, <a href="http://privacy.google.com/">privacy.google.com</a>, candidly answers these questions, and more. We also explain how we show relevant ads without selling your personal information, how encryption and spam filtering help keep your data safe, and how your information helps customize your experience on Google. Visit this site often to learn about new tools, features, and information that can help you make the choices that are right for you.<br /> <div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgOF9Atway9OxpZSxkvmRmie1wxGEh1Y5obx5lnmzRSgfzzpuMBhD9IXRPKnMfY4SNEhYooAWTA0bzZL9j1W7-WZPTTHuySXAVQoMa1bMHHsL-ZhZFodfgTM_jOyl9FD2YbJEI0/s1600/answers+site.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="389" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgOF9Atway9OxpZSxkvmRmie1wxGEh1Y5obx5lnmzRSgfzzpuMBhD9IXRPKnMfY4SNEhYooAWTA0bzZL9j1W7-WZPTTHuySXAVQoMa1bMHHsL-ZhZFodfgTM_jOyl9FD2YbJEI0/s640/answers+site.jpg" width="640" /></a></div>When you trust your personal information with us, you should expect powerful controls that keep it safe and private as well as useful answers to your questions. Today’s launches are just the latest in our ongoing efforts to protect you and your information on Google. There’s much more to come, and we look forward to your feedback.<br /> <br /> <span class="byline-author">Posted by Guemmy Kim, Product Manager, Account Controls and Settings</span> <span itemprop='author' itemscope='itemscope' itemtype='http://schema.org/Person'> <meta content='https://plus.google.com/116899029375914044550' itemprop='url'/> </span> </script> <noscript> We've all been there at some point or another…<br /> <i>You just lost your phone and want to wipe your personal information.</i><br /> <i>You attend an event, and you want to share your photos with some people (but not everyone).</i><br /> <i>You hesitate as you download another app that's asking for a lot of information.</i><br /> <br /> Everyday, we make choices that affect our privacy and security online. Most people, however, don’t feel they have the right level of control to make these important decisions. According to a <a href="http://www.pewinternet.org/2015/05/20/americans-attitudes-about-privacy-security-and-surveillance/">recent Pew study</a>, 93 percent of people think it’s important to control access to their personal information, and 90 percent care about the type of information that’s collected about them. But only 9 percent feel they have “a lot” of control over it. We want to change that.<br /> <br /> Google builds simple, powerful privacy and security tools that keep your information safe and put you in control of it. At Google I/O, we <a href="http://android-developers.blogspot.com/2015/05/android-m-developer-preview-tools.html">announced</a> that people will have more control over the information they provide to mobile apps in the M release, the next version of Android. Today, we’re rolling out two significant improvements to our privacy and security tools: a new hub for managing your Google settings called My Account, and a new site that answers important questions about privacy and security on Google.<br /> <br /> <b>Privacy and security controls, all in one place</b><br /> Privacy and security are two sides of the same coin: if your information isn’t secure, it certainly can’t be private. <a href="http://myaccount.google.com/">My Account</a> gives you quick access to the settings and tools that help you safeguard your data, protect your privacy, and decide what information is used to make Google services work better for you. It also provides more context to help you understand your options and make the right choices for you.<br /> <div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgdKDDn5OdNmPmhCy47x37E1THgTS7Xl0y-yhTsPuvlGNKcPDdPTkumyqxQ2ROHQYbnkFbClVXOsudOamhKdxCnPdRJkNHObjIXmkd7VKN2mxYoZ097YlqHjzHoLhMKiGWOlQp3/s1600/AC_Home_US+%25281%2529.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="360" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgdKDDn5OdNmPmhCy47x37E1THgTS7Xl0y-yhTsPuvlGNKcPDdPTkumyqxQ2ROHQYbnkFbClVXOsudOamhKdxCnPdRJkNHObjIXmkd7VKN2mxYoZ097YlqHjzHoLhMKiGWOlQp3/s640/AC_Home_US+%25281%2529.jpg" width="640" /></a></div>Here are some of the things you can do with My Account:<br /> <br /> <ul><li>Take the <a href="https://myaccount.google.com/privacycheckup">Privacy Checkup</a> and <a href="https://security.google.com/settings/security/secureaccount">Security Checkup</a>, our simple, step-by-step guides through your most important privacy and security settings.</li> <li>Manage the information that can be used from Search, Maps, YouTube and other products to enhance your experience on Google. For example, you can turn on and off settings such as Web and App Activity, which gets you more relevant, faster search results, or Location History, which enables Google Maps and Now to give you tips for a faster commute back home.</li> <li>Use the Ads Settings tool to control ads based on your interests and the searches you’ve done.</li> <li>Control which apps and sites are connected to your account.</li> </ul>We built My Account to be a resource for everyone, even if you don't have a Google Account. Check out your controls at <a href="http://myaccount.google.com/">myaccount.google.com</a>.<br /> <br /> <b>Answering your questions about privacy and security </b><br /> We listen to feedback from people around the world to better understand their concerns about privacy and security. In addition to My Account, we want to help people find answers to common questions on these topics, such as: "What data does Google collect? What does Google do with the data it collects? What tools do I have to control my Google experience?" <br /> <br /> Our new site, <a href="http://privacy.google.com/">privacy.google.com</a>, candidly answers these questions, and more. We also explain how we show relevant ads without selling your personal information, how encryption and spam filtering help keep your data safe, and how your information helps customize your experience on Google. Visit this site often to learn about new tools, features, and information that can help you make the choices that are right for you.<br /> <div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgOF9Atway9OxpZSxkvmRmie1wxGEh1Y5obx5lnmzRSgfzzpuMBhD9IXRPKnMfY4SNEhYooAWTA0bzZL9j1W7-WZPTTHuySXAVQoMa1bMHHsL-ZhZFodfgTM_jOyl9FD2YbJEI0/s1600/answers+site.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="389" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgOF9Atway9OxpZSxkvmRmie1wxGEh1Y5obx5lnmzRSgfzzpuMBhD9IXRPKnMfY4SNEhYooAWTA0bzZL9j1W7-WZPTTHuySXAVQoMa1bMHHsL-ZhZFodfgTM_jOyl9FD2YbJEI0/s640/answers+site.jpg" width="640" /></a></div>When you trust your personal information with us, you should expect powerful controls that keep it safe and private as well as useful answers to your questions. Today’s launches are just the latest in our ongoing efforts to protect you and your information on Google. There’s much more to come, and we look forward to your feedback.<br /> <br /> <span class="byline-author">Posted by Guemmy Kim, Product Manager, Account Controls and Settings</span> <span itemprop='author' itemscope='itemscope' itemtype='http://schema.org/Person'> <meta content='https://plus.google.com/116899029375914044550' itemprop='url'/> </span> </noscript> </div> </div> <div class='share'> <span class='gplus-share social-wrapper' data-href='https://plus.google.com/share?url=https://googleblog.blogspot.com/2015/06/privacy-security-tools-improvements.html'> <img alt='Share on Google+' height='24' src='https://www.gstatic.com/images/branding/google_plus/2x/ic_w_post_gplus_black_24dp.png' width='24'/> </span> <span class='twitter-custom social-wrapper' data-href='http://twitter.com/share?text=Official Google Blog:Keeping your personal information private and safe—and putting you in control&url=https://googleblog.blogspot.com/2015/06/privacy-security-tools-improvements.html&via=google'> <img alt='Share on Twitter' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_twitter_black_24dp.png' width='24'/> </span> <span class='fb-custom social-wrapper' data-href='https://www.facebook.com/sharer.php?u=https://googleblog.blogspot.com/2015/06/privacy-security-tools-improvements.html'> <img alt='Share on Facebook' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_facebook_black_24dp.png' width='24'/> </span> </div> <div class='post-footer'> <div class='cmt_iframe_holder' data-href='https://googleblog.blogspot.com/2015/06/privacy-security-tools-improvements.html' data-viewtype='FILTERED_POSTMOD'></div> <a href='https://plus.google.com/112374322230920073195' rel='author' style='display:none;'> Google </a> <div class='label-footer'> <span class='labels-caption'> Labels: </span> <span class='labels'> <a class='label' href='https://googleblog.blogspot.com/search/label/privacy%20and%20security' rel='tag'> privacy and security </a> , <a class='label' href='https://googleblog.blogspot.com/search/label/security' rel='tag'> security </a> </span> </div> </div> </div> <div class='post' data-id='5747839299393972559' itemscope='' itemtype='http://schema.org/BlogPosting'> <h2 class='title' itemprop='name'> <a href='https://googleblog.blogspot.com/2015/04/protect-your-google-account-with.html' itemprop='url' title='Protect your Google Account with Password Alert'> Protect your Google Account with Password Alert </a> </h2> <div class='post-header'> <div class='published'> <span class='publishdate' itemprop='datePublished'> April 29, 2015 </span> </div> </div> <div class='post-body'> <div class='post-content' itemprop='articleBody'> <script type='text/template'> Would you enter your email address and password on this page?<br /> <div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgooDMKm09n_kh5y1pi5yhn5YFegpq_F19qS_a5CrmwmKgyHS0XEePzSVxtNrqeIf4uIjs6nDY0sVJtRAAfq2yZ9284i42dMkVKH4h-5O0-bmWH6dxnPPvafTRBSKciRjyqTSAf7A/s1600/docs_phishing+(1).png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="444" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgooDMKm09n_kh5y1pi5yhn5YFegpq_F19qS_a5CrmwmKgyHS0XEePzSVxtNrqeIf4uIjs6nDY0sVJtRAAfq2yZ9284i42dMkVKH4h-5O0-bmWH6dxnPPvafTRBSKciRjyqTSAf7A/s1600/docs_phishing+(1).png" width="640" /></a></div><div class="separator" style="clear: both; text-align: left;">This looks like a fairly standard login page, but it’s not. It’s what we call a “phishing” page, a site run by people looking to receive and steal your password. If you type your password here, attackers could steal it and gain access to your Google Account—and you may not even know it. This is a common and dangerous trap: the most effective phishing attacks can succeed <a href="http://conferences2.sigcomm.org/imc/2014/papers/p347.pdf">45 percent of the time</a>, nearly 2 percent of messages to Gmail are designed to trick people into giving up their passwords, and various services across the web send millions upon millions of phishing emails, every day.</div><div class="separator" style="clear: both; text-align: left;"><br /> </div><div class="separator" style="clear: both; text-align: left;">To help keep your account safe, today we’re launching Password Alert, a <a href="https://chrome.google.com/webstore/detail/password-alert/noondiphcddnnabmjcihcjfbhfklnnep">free, open-source Chrome extension</a> that protects your Google and Google Apps for Work Accounts. Once you’ve installed it, Password Alert will show you a warning if you type your Google password into a site that isn’t a Google sign-in page. This protects you from phishing attacks and also encourages you to use different passwords for different sites, a security best practice.</div><div class="separator" style="clear: both; text-align: left;"><br /> </div><div class="separator" style="clear: both; text-align: left;">Here's how it works for consumer accounts. Once you’ve installed and initialized Password Alert, Chrome will remember a “scrambled” version of your Google Account password. It only remembers this information for security purposes and doesn’t share it with anyone. If you type your password into a site that isn't a Google sign-in page, Password Alert will show you a notice like the one below. This alert will tell you that you’re at risk of being phished so you can update your password and protect yourself.</div><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhs1Lp__Ez2-2Lfcpw731xZuCXDm4_wunnFB2fYyc2sGdAjSQbwLvHG0SXBTzjkR35hGd50B6koVNzTG4wk28vYIZvtqKNjNxaZgPBXc2RY93ABuDad6S9npnZsR6wFL-Yh53cMbw/s1600/phishing_caught.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="369" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhs1Lp__Ez2-2Lfcpw731xZuCXDm4_wunnFB2fYyc2sGdAjSQbwLvHG0SXBTzjkR35hGd50B6koVNzTG4wk28vYIZvtqKNjNxaZgPBXc2RY93ABuDad6S9npnZsR6wFL-Yh53cMbw/s1600/phishing_caught.png" width="640" /></a></div><div class="separator" style="clear: both; text-align: left;">Password Alert is also available to Google for Work customers, including Google Apps and Drive for Work. Your administrator can install Password Alert for everyone in the domains they manage, and receive alerts when Password Alert detects a possible problem. This can help spot malicious attackers trying to break into employee accounts and also reduce password reuse. Administrators can find more information <a href="https://support.google.com/a/answer/6197480">in the Help Center</a>.</div><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhuuHruVvElT-5t7imgYzeyPHq9NmZeUHIssa3xoFK-fVXsR_8rJqjV89Nj9tPTXBYYCuBaqrbuT2QsGZia3LYU83EWvMXf8-wxHD4RIdcDD7_Xfg01mHBYZjkGRsN-r5vq3sAiWw/s1600/gyb_pw_alert_blog.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="360" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhuuHruVvElT-5t7imgYzeyPHq9NmZeUHIssa3xoFK-fVXsR_8rJqjV89Nj9tPTXBYYCuBaqrbuT2QsGZia3LYU83EWvMXf8-wxHD4RIdcDD7_Xfg01mHBYZjkGRsN-r5vq3sAiWw/s1600/gyb_pw_alert_blog.gif" width="640" /></a></div><div class="separator" style="clear: both; text-align: left;">We work to protect users from phishing attacks in a variety of ways. We’re constantly improving our <a href="http://googleblog.blogspot.com/2015/03/protecting-people-across-web-with.html">Safe Browsing</a> technology, which protects more than 1 billion people on Chrome, Safari and Firefox from phishing and other dangerous sites via bright, red warnings. We also offer tools like <a href="https://www.google.com/landing/2step/">2-Step Verification</a> and <a href="https://support.google.com/accounts/answer/6103523?hl=en">Security Key</a> that people can use to protect their Google Accounts and stay safe online. And of course, you can also take a <a href="http://googleblog.blogspot.com/2015/02/take-security-checkup-on-safer-internet.html">Security Checkup</a> at any time to make sure the safety and security information associated with your account is current. </div><br /> To get started with Password Alert, visit the <a href="https://chrome.google.com/webstore/detail/password-alert/noondiphcddnnabmjcihcjfbhfklnnep">Chrome Web Store</a> or the <a href="https://support.google.com/a/answer/6197508">FAQ</a>.<br /> <br /> <span class="byline-author">Posted by Drew Hintz, Security Engineer and Justin Kosslyn, Google Ideas</span> <span itemprop='author' itemscope='itemscope' itemtype='http://schema.org/Person'> <meta content='https://plus.google.com/116899029375914044550' itemprop='url'/> </span> </script> <noscript> Would you enter your email address and password on this page?<br /> <div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgooDMKm09n_kh5y1pi5yhn5YFegpq_F19qS_a5CrmwmKgyHS0XEePzSVxtNrqeIf4uIjs6nDY0sVJtRAAfq2yZ9284i42dMkVKH4h-5O0-bmWH6dxnPPvafTRBSKciRjyqTSAf7A/s1600/docs_phishing+(1).png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="444" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgooDMKm09n_kh5y1pi5yhn5YFegpq_F19qS_a5CrmwmKgyHS0XEePzSVxtNrqeIf4uIjs6nDY0sVJtRAAfq2yZ9284i42dMkVKH4h-5O0-bmWH6dxnPPvafTRBSKciRjyqTSAf7A/s1600/docs_phishing+(1).png" width="640" /></a></div><div class="separator" style="clear: both; text-align: left;">This looks like a fairly standard login page, but it’s not. It’s what we call a “phishing” page, a site run by people looking to receive and steal your password. If you type your password here, attackers could steal it and gain access to your Google Account—and you may not even know it. This is a common and dangerous trap: the most effective phishing attacks can succeed <a href="http://conferences2.sigcomm.org/imc/2014/papers/p347.pdf">45 percent of the time</a>, nearly 2 percent of messages to Gmail are designed to trick people into giving up their passwords, and various services across the web send millions upon millions of phishing emails, every day.</div><div class="separator" style="clear: both; text-align: left;"><br /> </div><div class="separator" style="clear: both; text-align: left;">To help keep your account safe, today we’re launching Password Alert, a <a href="https://chrome.google.com/webstore/detail/password-alert/noondiphcddnnabmjcihcjfbhfklnnep">free, open-source Chrome extension</a> that protects your Google and Google Apps for Work Accounts. Once you’ve installed it, Password Alert will show you a warning if you type your Google password into a site that isn’t a Google sign-in page. This protects you from phishing attacks and also encourages you to use different passwords for different sites, a security best practice.</div><div class="separator" style="clear: both; text-align: left;"><br /> </div><div class="separator" style="clear: both; text-align: left;">Here's how it works for consumer accounts. Once you’ve installed and initialized Password Alert, Chrome will remember a “scrambled” version of your Google Account password. It only remembers this information for security purposes and doesn’t share it with anyone. If you type your password into a site that isn't a Google sign-in page, Password Alert will show you a notice like the one below. This alert will tell you that you’re at risk of being phished so you can update your password and protect yourself.</div><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhs1Lp__Ez2-2Lfcpw731xZuCXDm4_wunnFB2fYyc2sGdAjSQbwLvHG0SXBTzjkR35hGd50B6koVNzTG4wk28vYIZvtqKNjNxaZgPBXc2RY93ABuDad6S9npnZsR6wFL-Yh53cMbw/s1600/phishing_caught.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="369" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhs1Lp__Ez2-2Lfcpw731xZuCXDm4_wunnFB2fYyc2sGdAjSQbwLvHG0SXBTzjkR35hGd50B6koVNzTG4wk28vYIZvtqKNjNxaZgPBXc2RY93ABuDad6S9npnZsR6wFL-Yh53cMbw/s1600/phishing_caught.png" width="640" /></a></div><div class="separator" style="clear: both; text-align: left;">Password Alert is also available to Google for Work customers, including Google Apps and Drive for Work. Your administrator can install Password Alert for everyone in the domains they manage, and receive alerts when Password Alert detects a possible problem. This can help spot malicious attackers trying to break into employee accounts and also reduce password reuse. Administrators can find more information <a href="https://support.google.com/a/answer/6197480">in the Help Center</a>.</div><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhuuHruVvElT-5t7imgYzeyPHq9NmZeUHIssa3xoFK-fVXsR_8rJqjV89Nj9tPTXBYYCuBaqrbuT2QsGZia3LYU83EWvMXf8-wxHD4RIdcDD7_Xfg01mHBYZjkGRsN-r5vq3sAiWw/s1600/gyb_pw_alert_blog.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="360" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhuuHruVvElT-5t7imgYzeyPHq9NmZeUHIssa3xoFK-fVXsR_8rJqjV89Nj9tPTXBYYCuBaqrbuT2QsGZia3LYU83EWvMXf8-wxHD4RIdcDD7_Xfg01mHBYZjkGRsN-r5vq3sAiWw/s1600/gyb_pw_alert_blog.gif" width="640" /></a></div><div class="separator" style="clear: both; text-align: left;">We work to protect users from phishing attacks in a variety of ways. We’re constantly improving our <a href="http://googleblog.blogspot.com/2015/03/protecting-people-across-web-with.html">Safe Browsing</a> technology, which protects more than 1 billion people on Chrome, Safari and Firefox from phishing and other dangerous sites via bright, red warnings. We also offer tools like <a href="https://www.google.com/landing/2step/">2-Step Verification</a> and <a href="https://support.google.com/accounts/answer/6103523?hl=en">Security Key</a> that people can use to protect their Google Accounts and stay safe online. And of course, you can also take a <a href="http://googleblog.blogspot.com/2015/02/take-security-checkup-on-safer-internet.html">Security Checkup</a> at any time to make sure the safety and security information associated with your account is current. </div><br /> To get started with Password Alert, visit the <a href="https://chrome.google.com/webstore/detail/password-alert/noondiphcddnnabmjcihcjfbhfklnnep">Chrome Web Store</a> or the <a href="https://support.google.com/a/answer/6197508">FAQ</a>.<br /> <br /> <span class="byline-author">Posted by Drew Hintz, Security Engineer and Justin Kosslyn, Google Ideas</span> <span itemprop='author' itemscope='itemscope' itemtype='http://schema.org/Person'> <meta content='https://plus.google.com/116899029375914044550' itemprop='url'/> </span> </noscript> </div> </div> <div class='share'> <span class='gplus-share social-wrapper' data-href='https://plus.google.com/share?url=https://googleblog.blogspot.com/2015/04/protect-your-google-account-with.html'> <img alt='Share on Google+' height='24' src='https://www.gstatic.com/images/branding/google_plus/2x/ic_w_post_gplus_black_24dp.png' width='24'/> </span> <span class='twitter-custom social-wrapper' data-href='http://twitter.com/share?text=Official Google Blog:Protect your Google Account with Password Alert&url=https://googleblog.blogspot.com/2015/04/protect-your-google-account-with.html&via=google'> <img alt='Share on Twitter' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_twitter_black_24dp.png' width='24'/> </span> <span class='fb-custom social-wrapper' data-href='https://www.facebook.com/sharer.php?u=https://googleblog.blogspot.com/2015/04/protect-your-google-account-with.html'> <img alt='Share on Facebook' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_facebook_black_24dp.png' width='24'/> </span> </div> <div class='post-footer'> <div class='cmt_iframe_holder' data-href='https://googleblog.blogspot.com/2015/04/protect-your-google-account-with.html' data-viewtype='FILTERED_POSTMOD'></div> <a href='https://plus.google.com/112374322230920073195' rel='author' style='display:none;'> Google </a> <div class='label-footer'> <span class='labels-caption'> Labels: </span> <span class='labels'> <a class='label' href='https://googleblog.blogspot.com/search/label/security' rel='tag'> security </a> </span> </div> </div> </div> <div class='post' data-id='7234264769351378654' itemscope='' itemtype='http://schema.org/BlogPosting'> <h2 class='title' itemprop='name'> <a href='https://googleblog.blogspot.com/2015/03/protecting-people-across-web-with.html' itemprop='url' title='Protecting people across the web with Google Safe Browsing'> Protecting people across the web with Google Safe Browsing </a> </h2> <div class='post-header'> <div class='published'> <span class='publishdate' itemprop='datePublished'> March 12, 2015 </span> </div> </div> <div class='post-body'> <div class='post-content' itemprop='articleBody'> <script type='text/template'> <i>Online security is <a href="//googleblog.blogspot.com/2015/02/take-security-checkup-on-safer-internet.html">on everybody's minds these days</a>, so we want to give you updates about various ways Google keeps you safe online. Today, on the web’s birthday, we’re highlighting recent improvements to Safe Browsing, technology that protects more than 1.1 billion people all over the world.</i> -Ed.<br /> <br /> As the web continues to evolve, it’s important that user protections develop in lockstep so that people stay safe online. Our Safe Browsing technology may not be <i>quite</i> as old as the web—which celebrates its <a href="http://home.web.cern.ch/about/updates/2014/03/world-wide-web-born-cern-25-years-ago">26th birthday</a> today—but ever since Safe Browsing <a href="http://googleonlinesecurity.blogspot.com/2007/05/introducing-googles-anti-malware.html">launched</a> nearly eight years ago, it’s continually adapted to protect web users, everywhere.<br /> <div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj6b9dF_eBN3yoyeEzlQOvOvnMOX42cUm_FmNngbTAMW93g8mQ1-R5WNgmg_NdpnRyG18KvrdIX-yatyLbcHSmj-QEVri9zXIB4Lr42Y1xZJGn3MlQHrM_ApLPdhJXjNetMoBKO/s1600/CK_Google_Cake_Blog.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="180" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj6b9dF_eBN3yoyeEzlQOvOvnMOX42cUm_FmNngbTAMW93g8mQ1-R5WNgmg_NdpnRyG18KvrdIX-yatyLbcHSmj-QEVri9zXIB4Lr42Y1xZJGn3MlQHrM_ApLPdhJXjNetMoBKO/s1600/CK_Google_Cake_Blog.gif" width="320" /></a></div>Safe Browsing gives users—both on Google and across on the web—information they need to steer clear of danger. The dangerous sites detected by Safe Browsing generally fall into two categories: sites that attack users <i>intentionally</i> with either <a href="http://en.wikipedia.org/wiki/Malware">malware</a>, <a href="http://en.wikipedia.org/wiki/Phishing">phishing</a>, or <a href="https://www.google.com/about/company/unwanted-software-policy.html">unwanted software</a> that is deceptive or hard to uninstall, or sites that attack users <i>unintentionally</i> because they have been compromised, often without the site’s owner realizing this has happened.<br /> <br /> Once we detect these sites, Safe Browsing warns people about them in a variety of ways. You’ve probably come across a warning like this in Chrome, Firefox or Safari; it’s powered by Safe Browsing:<br /> <div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7XYZib0H7yoZ8TWujte3qkOpdO7u7ujapc8q9CQY9kWfDC5C6ITTtpQmPqYoY9Pl18eK9G3bgVRyYn7VZkIc8IHGla4s4L9nbxt8b44Q-ADKWTQxDAl-TtW5_dAz8FN5WIcPN/s1600/png;base6454b054f31de5fa53.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="283" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7XYZib0H7yoZ8TWujte3qkOpdO7u7ujapc8q9CQY9kWfDC5C6ITTtpQmPqYoY9Pl18eK9G3bgVRyYn7VZkIc8IHGla4s4L9nbxt8b44Q-ADKWTQxDAl-TtW5_dAz8FN5WIcPN/s1600/png;base6454b054f31de5fa53.png" width="400" /></a></div>Today, Safe Browsing shows people more than 5 million warnings per day for all sorts of malicious sites and unwanted software, and discovers more than 50,000 malware sites and more than 90,000 phishing sites every month. If you’re interested, you can see information about the dangerous sites that are detected by this technology anytime in our <a href="//www.google.com/transparencyreport/safebrowsing/">Safe Browsing Transparency Report</a>.<br /> <br /> We also use Safe Browsing technology to warn website owners or operators about issues with their sites so they can quickly fix them. We provide basic site maintenance tips, as well as specific Safe Browsing notifications in Webmaster Tools and Google Analytics. Often site owners don’t realize there are issues with their sites until they get these notifications.<br /> <br /> <b>Recent developments</b><br /> Since its earliest days, Safe Browsing has been widely available, and free—for users, site owners, and other companies—to use and integrate into their own products. In the early days, we focused on detecting dangerous sites and then showing people warnings:<br /> <br /> <div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhWWWO45A44P1SakllP4qdYva05ma5eX-3awkhZOt-NumomfPg8yNTDRcGm5DJdi0E8J85FhOQIPV0u0Wk-KNDDUKrNpMtYIPG5x7wo_ERs524JU2uuFjrOZVbbHEzEZd0SvQq6/s1600/old+safe+browsing+warning.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="278" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhWWWO45A44P1SakllP4qdYva05ma5eX-3awkhZOt-NumomfPg8yNTDRcGm5DJdi0E8J85FhOQIPV0u0Wk-KNDDUKrNpMtYIPG5x7wo_ERs524JU2uuFjrOZVbbHEzEZd0SvQq6/s1600/old+safe+browsing+warning.png" width="400" /></a></div><div style="text-align: center;"><i>An early Safe Browsing notification, c. 2007. These would appear in the top right corner of people’s web browsers when they visited a site that had been flagged by Safe Browsing as potentially dangerous.</i></div><br /> But, just as attacks become more sophisticated, we’ve made sure our own technologies have kept up. Over the years, we’ve built Safe Browsing into other Google products to help protect people in more places:<br /> <br /> <ul><li><b>Safe Browsing API:</b> We already make Safe Browsing data available for free to developers. This week we’re adding information about sites that host unwanted software, allowing developers to better protect their users as well.</li> <li><b>Chrome: </b>Before people <a href="http://googleonlinesecurity.blogspot.com/2015/02/more-protection-from-unwanted-software.html">visit</a> a site delivering <a href="https://www.google.com/about/company/unwanted-software-policy.html">unwanted software</a>, or try to <a href="http://googleonlinesecurity.blogspot.com/2014/08/thats-not-download-youre-looking-for.html">download</a> some of it, we show them a clear warning.</li> <li><b>Google Analytics:</b> We recently <a href="http://googleonlinesecurity.blogspot.com/2015/02/safe-browsing-and-google-analytics.html">integrated</a> Safe Browsing notifications into Google Analytics, so site owners can quickly take action to protect their users if there are issues with their websites. Previously, we’d only provided these warnings via our Webmaster Tools service.</li> <li><b>Ads:</b> We’ve also <a href="https://support.google.com/adwordspolicy/answer/6101154?hl=en&ref_topic=29265">recently</a> begun to identify ads that target people with unwanted software.</li> </ul><br /> As the web grows up, Safe Browsing technology will, too. We’re looking forward to protecting the web, and its users, for many birthdays to come.<br /> <br /> <span class="byline-author">Posted by Panayiotis Mavrommatis, Safe Browsing Team</span> <span itemprop='author' itemscope='itemscope' itemtype='http://schema.org/Person'> <meta content='https://plus.google.com/116899029375914044550' itemprop='url'/> </span> </script> <noscript> <i>Online security is <a href="//googleblog.blogspot.com/2015/02/take-security-checkup-on-safer-internet.html">on everybody's minds these days</a>, so we want to give you updates about various ways Google keeps you safe online. Today, on the web’s birthday, we’re highlighting recent improvements to Safe Browsing, technology that protects more than 1.1 billion people all over the world.</i> -Ed.<br /> <br /> As the web continues to evolve, it’s important that user protections develop in lockstep so that people stay safe online. Our Safe Browsing technology may not be <i>quite</i> as old as the web—which celebrates its <a href="http://home.web.cern.ch/about/updates/2014/03/world-wide-web-born-cern-25-years-ago">26th birthday</a> today—but ever since Safe Browsing <a href="http://googleonlinesecurity.blogspot.com/2007/05/introducing-googles-anti-malware.html">launched</a> nearly eight years ago, it’s continually adapted to protect web users, everywhere.<br /> <div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj6b9dF_eBN3yoyeEzlQOvOvnMOX42cUm_FmNngbTAMW93g8mQ1-R5WNgmg_NdpnRyG18KvrdIX-yatyLbcHSmj-QEVri9zXIB4Lr42Y1xZJGn3MlQHrM_ApLPdhJXjNetMoBKO/s1600/CK_Google_Cake_Blog.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="180" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj6b9dF_eBN3yoyeEzlQOvOvnMOX42cUm_FmNngbTAMW93g8mQ1-R5WNgmg_NdpnRyG18KvrdIX-yatyLbcHSmj-QEVri9zXIB4Lr42Y1xZJGn3MlQHrM_ApLPdhJXjNetMoBKO/s1600/CK_Google_Cake_Blog.gif" width="320" /></a></div>Safe Browsing gives users—both on Google and across on the web—information they need to steer clear of danger. The dangerous sites detected by Safe Browsing generally fall into two categories: sites that attack users <i>intentionally</i> with either <a href="http://en.wikipedia.org/wiki/Malware">malware</a>, <a href="http://en.wikipedia.org/wiki/Phishing">phishing</a>, or <a href="https://www.google.com/about/company/unwanted-software-policy.html">unwanted software</a> that is deceptive or hard to uninstall, or sites that attack users <i>unintentionally</i> because they have been compromised, often without the site’s owner realizing this has happened.<br /> <br /> Once we detect these sites, Safe Browsing warns people about them in a variety of ways. You’ve probably come across a warning like this in Chrome, Firefox or Safari; it’s powered by Safe Browsing:<br /> <div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7XYZib0H7yoZ8TWujte3qkOpdO7u7ujapc8q9CQY9kWfDC5C6ITTtpQmPqYoY9Pl18eK9G3bgVRyYn7VZkIc8IHGla4s4L9nbxt8b44Q-ADKWTQxDAl-TtW5_dAz8FN5WIcPN/s1600/png;base6454b054f31de5fa53.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="283" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7XYZib0H7yoZ8TWujte3qkOpdO7u7ujapc8q9CQY9kWfDC5C6ITTtpQmPqYoY9Pl18eK9G3bgVRyYn7VZkIc8IHGla4s4L9nbxt8b44Q-ADKWTQxDAl-TtW5_dAz8FN5WIcPN/s1600/png;base6454b054f31de5fa53.png" width="400" /></a></div>Today, Safe Browsing shows people more than 5 million warnings per day for all sorts of malicious sites and unwanted software, and discovers more than 50,000 malware sites and more than 90,000 phishing sites every month. If you’re interested, you can see information about the dangerous sites that are detected by this technology anytime in our <a href="//www.google.com/transparencyreport/safebrowsing/">Safe Browsing Transparency Report</a>.<br /> <br /> We also use Safe Browsing technology to warn website owners or operators about issues with their sites so they can quickly fix them. We provide basic site maintenance tips, as well as specific Safe Browsing notifications in Webmaster Tools and Google Analytics. Often site owners don’t realize there are issues with their sites until they get these notifications.<br /> <br /> <b>Recent developments</b><br /> Since its earliest days, Safe Browsing has been widely available, and free—for users, site owners, and other companies—to use and integrate into their own products. In the early days, we focused on detecting dangerous sites and then showing people warnings:<br /> <br /> <div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhWWWO45A44P1SakllP4qdYva05ma5eX-3awkhZOt-NumomfPg8yNTDRcGm5DJdi0E8J85FhOQIPV0u0Wk-KNDDUKrNpMtYIPG5x7wo_ERs524JU2uuFjrOZVbbHEzEZd0SvQq6/s1600/old+safe+browsing+warning.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="278" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhWWWO45A44P1SakllP4qdYva05ma5eX-3awkhZOt-NumomfPg8yNTDRcGm5DJdi0E8J85FhOQIPV0u0Wk-KNDDUKrNpMtYIPG5x7wo_ERs524JU2uuFjrOZVbbHEzEZd0SvQq6/s1600/old+safe+browsing+warning.png" width="400" /></a></div><div style="text-align: center;"><i>An early Safe Browsing notification, c. 2007. These would appear in the top right corner of people’s web browsers when they visited a site that had been flagged by Safe Browsing as potentially dangerous.</i></div><br /> But, just as attacks become more sophisticated, we’ve made sure our own technologies have kept up. Over the years, we’ve built Safe Browsing into other Google products to help protect people in more places:<br /> <br /> <ul><li><b>Safe Browsing API:</b> We already make Safe Browsing data available for free to developers. This week we’re adding information about sites that host unwanted software, allowing developers to better protect their users as well.</li> <li><b>Chrome: </b>Before people <a href="http://googleonlinesecurity.blogspot.com/2015/02/more-protection-from-unwanted-software.html">visit</a> a site delivering <a href="https://www.google.com/about/company/unwanted-software-policy.html">unwanted software</a>, or try to <a href="http://googleonlinesecurity.blogspot.com/2014/08/thats-not-download-youre-looking-for.html">download</a> some of it, we show them a clear warning.</li> <li><b>Google Analytics:</b> We recently <a href="http://googleonlinesecurity.blogspot.com/2015/02/safe-browsing-and-google-analytics.html">integrated</a> Safe Browsing notifications into Google Analytics, so site owners can quickly take action to protect their users if there are issues with their websites. Previously, we’d only provided these warnings via our Webmaster Tools service.</li> <li><b>Ads:</b> We’ve also <a href="https://support.google.com/adwordspolicy/answer/6101154?hl=en&ref_topic=29265">recently</a> begun to identify ads that target people with unwanted software.</li> </ul><br /> As the web grows up, Safe Browsing technology will, too. We’re looking forward to protecting the web, and its users, for many birthdays to come.<br /> <br /> <span class="byline-author">Posted by Panayiotis Mavrommatis, Safe Browsing Team</span> <span itemprop='author' itemscope='itemscope' itemtype='http://schema.org/Person'> <meta content='https://plus.google.com/116899029375914044550' itemprop='url'/> </span> </noscript> </div> </div> <div class='share'> <span class='gplus-share social-wrapper' data-href='https://plus.google.com/share?url=https://googleblog.blogspot.com/2015/03/protecting-people-across-web-with.html'> <img alt='Share on Google+' height='24' src='https://www.gstatic.com/images/branding/google_plus/2x/ic_w_post_gplus_black_24dp.png' width='24'/> </span> <span class='twitter-custom social-wrapper' data-href='http://twitter.com/share?text=Official Google Blog:Protecting people across the web with Google Safe Browsing&url=https://googleblog.blogspot.com/2015/03/protecting-people-across-web-with.html&via=google'> <img alt='Share on Twitter' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_twitter_black_24dp.png' width='24'/> </span> <span class='fb-custom social-wrapper' data-href='https://www.facebook.com/sharer.php?u=https://googleblog.blogspot.com/2015/03/protecting-people-across-web-with.html'> <img alt='Share on Facebook' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_facebook_black_24dp.png' width='24'/> </span> </div> <div class='post-footer'> <div class='cmt_iframe_holder' data-href='https://googleblog.blogspot.com/2015/03/protecting-people-across-web-with.html' data-viewtype='FILTERED_POSTMOD'></div> <a href='https://plus.google.com/112374322230920073195' rel='author' style='display:none;'> Google </a> <div class='label-footer'> <span class='labels-caption'> Labels: </span> <span class='labels'> <a class='label' href='https://googleblog.blogspot.com/search/label/security' rel='tag'> security </a> </span> </div> </div> </div> <div class='post' data-id='5616226115263562498' itemscope='' itemtype='http://schema.org/BlogPosting'> <h2 class='title' itemprop='name'> <a href='https://googleblog.blogspot.com/2015/02/take-security-checkup-on-safer-internet.html' itemprop='url' title='Take a Security Checkup on Safer Internet Day'> Take a Security Checkup on Safer Internet Day </a> </h2> <div class='post-header'> <div class='published'> <span class='publishdate' itemprop='datePublished'> February 10, 2015 </span> </div> </div> <div class='post-body'> <div class='post-content' itemprop='articleBody'> <script type='text/template'> Online security is on everyone’s mind these days. According to a recent <a href="http://www.gallup.com/poll/178856/hacking-tops-list-crimes-americans-worry.aspx">Gallup poll</a>, more people are worried about their online accounts being hacked than having their home broken into.<br /> <br /> Security has always been a top priority for Google. Our <a href="//www.google.com/transparencyreport/safebrowsing/">Safe Browsing</a> technology identifies unsafe websites and warns people before they visit them, protecting more than one billion Chrome, Firefox, and Safari users everyday. <a href="https://www.google.com/landing/2step/">2-Step Verification</a> adds an extra layer of security, beyond your password, to your Google account; it’s like a second padlock on your account’s door. And our research teams regularly release new findings about nefarious online activity, like <a href="http://googleonlinesecurity.blogspot.com/2014/11/behind-enemy-lines-in-our-war-against.html">Gmail account hijacking attempts</a>, so people can stay informed.<br /> <br /> We have many protections in place to keep people, and their information, secure, but there's also a lot that you can do to protect yourself. Today, on <a href="http://www.saferinternetday.org/web/guest">Safer Internet Day</a>, take a quick <a href="https://security.google.com/settings/security/secureaccount">Security Checkup</a>, an easy way to review and manage your Google Account’s security settings.<br /> <div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjzxi5041mjHaucNRU1d4UiIq2oexTTpa2VBtKNobKYoy9ck-Up3_LTK88e_K_Oy26wu2-I7ge85NBoFLjDTNEqEWTT1sNC6mdunWZydREcMgsRRBZgUOlfKXXlX6H6G0dxnPjn/s1600/SecurityCheckup_Blog_1200x646_2x.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="215" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjzxi5041mjHaucNRU1d4UiIq2oexTTpa2VBtKNobKYoy9ck-Up3_LTK88e_K_Oy26wu2-I7ge85NBoFLjDTNEqEWTT1sNC6mdunWZydREcMgsRRBZgUOlfKXXlX6H6G0dxnPjn/s1600/SecurityCheckup_Blog_1200x646_2x.gif" width="400" /></a></div>Here are some of the important items you can review during your Security Checkup:<br /> <ul><li><b>Recovery information</b>: Adding a phone number can help us get in touch if you’re locked out of your account. We’ll only use your phone number to <a href="https://support.google.com/accounts/answer/183728?hl=en">protect your account</a>, unless you say otherwise.</li> <li><b>Recent activity</b>: This is a quick overview of your recent sign-ins to Google. If you see any activity from a location or device you don’t recognize, change your password immediately.</li> <li><b>Account permissions</b>: These are the apps, websites and devices connected to your Google account. Take a look and make sure you trust—and actually use—all of them. You might want to remove an old phone, or that dusty app you never use.</li> </ul>It takes just a few minutes to make sure your information is accurate and up to date. And as an extra thank you, we’ll <a href="http://googledrive.blogspot.com/2015/02/safer-internet-day-2015.html">add 2GB to your Drive storage plan</a> if you complete the Security Checkup by February 17. Visit your <a href="https://security.google.com/settings/security/secureaccount">Account Settings</a> and take your Security Checkup today.<br /> <br /> <span class="byline-author">Posted by Andreas Tuerk, Product Manager</span> <span itemprop='author' itemscope='itemscope' itemtype='http://schema.org/Person'> <meta content='https://plus.google.com/116899029375914044550' itemprop='url'/> </span> </script> <noscript> Online security is on everyone’s mind these days. According to a recent <a href="http://www.gallup.com/poll/178856/hacking-tops-list-crimes-americans-worry.aspx">Gallup poll</a>, more people are worried about their online accounts being hacked than having their home broken into.<br /> <br /> Security has always been a top priority for Google. Our <a href="//www.google.com/transparencyreport/safebrowsing/">Safe Browsing</a> technology identifies unsafe websites and warns people before they visit them, protecting more than one billion Chrome, Firefox, and Safari users everyday. <a href="https://www.google.com/landing/2step/">2-Step Verification</a> adds an extra layer of security, beyond your password, to your Google account; it’s like a second padlock on your account’s door. And our research teams regularly release new findings about nefarious online activity, like <a href="http://googleonlinesecurity.blogspot.com/2014/11/behind-enemy-lines-in-our-war-against.html">Gmail account hijacking attempts</a>, so people can stay informed.<br /> <br /> We have many protections in place to keep people, and their information, secure, but there's also a lot that you can do to protect yourself. Today, on <a href="http://www.saferinternetday.org/web/guest">Safer Internet Day</a>, take a quick <a href="https://security.google.com/settings/security/secureaccount">Security Checkup</a>, an easy way to review and manage your Google Account’s security settings.<br /> <div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjzxi5041mjHaucNRU1d4UiIq2oexTTpa2VBtKNobKYoy9ck-Up3_LTK88e_K_Oy26wu2-I7ge85NBoFLjDTNEqEWTT1sNC6mdunWZydREcMgsRRBZgUOlfKXXlX6H6G0dxnPjn/s1600/SecurityCheckup_Blog_1200x646_2x.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="215" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjzxi5041mjHaucNRU1d4UiIq2oexTTpa2VBtKNobKYoy9ck-Up3_LTK88e_K_Oy26wu2-I7ge85NBoFLjDTNEqEWTT1sNC6mdunWZydREcMgsRRBZgUOlfKXXlX6H6G0dxnPjn/s1600/SecurityCheckup_Blog_1200x646_2x.gif" width="400" /></a></div>Here are some of the important items you can review during your Security Checkup:<br /> <ul><li><b>Recovery information</b>: Adding a phone number can help us get in touch if you’re locked out of your account. We’ll only use your phone number to <a href="https://support.google.com/accounts/answer/183728?hl=en">protect your account</a>, unless you say otherwise.</li> <li><b>Recent activity</b>: This is a quick overview of your recent sign-ins to Google. If you see any activity from a location or device you don’t recognize, change your password immediately.</li> <li><b>Account permissions</b>: These are the apps, websites and devices connected to your Google account. Take a look and make sure you trust—and actually use—all of them. You might want to remove an old phone, or that dusty app you never use.</li> </ul>It takes just a few minutes to make sure your information is accurate and up to date. And as an extra thank you, we’ll <a href="http://googledrive.blogspot.com/2015/02/safer-internet-day-2015.html">add 2GB to your Drive storage plan</a> if you complete the Security Checkup by February 17. Visit your <a href="https://security.google.com/settings/security/secureaccount">Account Settings</a> and take your Security Checkup today.<br /> <br /> <span class="byline-author">Posted by Andreas Tuerk, Product Manager</span> <span itemprop='author' itemscope='itemscope' itemtype='http://schema.org/Person'> <meta content='https://plus.google.com/116899029375914044550' itemprop='url'/> </span> </noscript> </div> </div> <div class='share'> <span class='gplus-share social-wrapper' data-href='https://plus.google.com/share?url=https://googleblog.blogspot.com/2015/02/take-security-checkup-on-safer-internet.html'> <img alt='Share on Google+' height='24' src='https://www.gstatic.com/images/branding/google_plus/2x/ic_w_post_gplus_black_24dp.png' width='24'/> </span> <span class='twitter-custom social-wrapper' data-href='http://twitter.com/share?text=Official Google Blog:Take a Security Checkup on Safer Internet Day&url=https://googleblog.blogspot.com/2015/02/take-security-checkup-on-safer-internet.html&via=google'> <img alt='Share on Twitter' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_twitter_black_24dp.png' width='24'/> </span> <span class='fb-custom social-wrapper' data-href='https://www.facebook.com/sharer.php?u=https://googleblog.blogspot.com/2015/02/take-security-checkup-on-safer-internet.html'> <img alt='Share on Facebook' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_facebook_black_24dp.png' width='24'/> </span> </div> <div class='post-footer'> <div class='cmt_iframe_holder' data-href='https://googleblog.blogspot.com/2015/02/take-security-checkup-on-safer-internet.html' data-viewtype='FILTERED_POSTMOD'></div> <a href='https://plus.google.com/112374322230920073195' rel='author' style='display:none;'> Google </a> <div class='label-footer'> <span class='labels-caption'> Labels: </span> <span class='labels'> <a class='label' href='https://googleblog.blogspot.com/search/label/security' rel='tag'> security </a> , <a class='label' href='https://googleblog.blogspot.com/search/label/security%20and%20safety%20tips' rel='tag'> security and safety tips </a> </span> </div> </div> </div> <div class='post' data-id='14172546809803866' itemscope='' itemtype='http://schema.org/BlogPosting'> <h2 class='title' itemprop='name'> <a href='https://googleblog.blogspot.com/2014/06/transparency-report-protecting-emails.html' itemprop='url' title='Transparency Report: Protecting emails as they travel across the web'> Transparency Report: Protecting emails as they travel across the web </a> </h2> <div class='post-header'> <div class='published'> <span class='publishdate' itemprop='datePublished'> June 3, 2014 </span> </div> </div> <div class='post-body'> <div class='post-content' itemprop='articleBody'> <script type='text/template'> When you mail a letter to your friend, you hope she’ll be the only person who reads it. But a lot could happen to that letter on its way from you to her, and prying eyes might try to take a look. That’s why we send important messages in sealed envelopes, rather than on postcards.<br /> <br /> Email works in a similar way. Emails that are <a href="http://en.wikipedia.org/wiki/Encryption">encrypted</a> as they’re routed from sender to receiver are like sealed envelopes, and less vulnerable to snooping—whether by bad actors or through government surveillance—than postcards.<br /> <br /> But some email is more secure than others. So to help you better understand whether your emails are protected by encryption, we’re launching a <a href="//www.google.com/transparencyreport/saferemail/">new section</a> in the <a href="//www.google.com/transparencyreport">Transparency Report</a>.<br /> <div class="separator" style="clear: both; text-align: center;"> <a href="//www.google.com/transparencyreport/saferemail/" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEipnepiMKXzr2QBZaf-b08YrgyEF3lzoIcqr-8uBjvhzIPv5FdAauJZ7B3hxxVSjAqWdRHg8MkCAH7jn7XpBpdQkzK37IgfJ9AG7bLuPn6IMNYhQgaLdc7dU4tYW1ixD-5aVmfu/s640/Screen+Shot+2014-06-03+at+11.15.23+AM.png" /></a></div> Gmail has always supported encryption in transit by using <a href="http://en.wikipedia.org/wiki/Transport_Layer_Security">Transport Layer Security</a> (TLS), and will <a href="http://googleblog.blogspot.com/2014/03/staying-at-forefront-of-email-security.html">automatically encrypt</a> your incoming and outgoing emails if it can. The important thing is that <i>both</i> sides of an email exchange need to support encryption for it to work; Gmail can't do it alone.<br /> <br /> Our data show that approximately 40 to 50 percent of emails sent between Gmail and other email providers aren’t encrypted. Many providers have turned on encryption, and others have said they’re going to, which is great news. As they do, more and more emails will be shielded from snooping.<br /> <br /> For people looking for even stronger email security, <a href="http://en.wikipedia.org/wiki/End-to-end_encryption">end-to-end encryption</a> is a good option—but it’s been hard to use. So today we’re making available the source code for <a href="http://googleonlinesecurity.blogspot.com/2014/06/making-end-to-end-encryption-easier-to.html">End-to-End</a>, a Chrome extension. It's currently in testing, and once it's ready for general use it will make this technology easier for those who choose to use it.<br /> <br /> We encourage you to find tips about <a href="//www.google.com/goodtoknow/online-safety/passwords/">choosing strong passwords</a> and <a href="//www.google.com/goodtoknow/protection/identity/">adding another layer of protection</a> to your account in our <a href="//www.google.com/goodtoknow/familysafety/">Safety Center</a>. And check out <a href="https://www.resetthenet.org/">Reset the Net</a>, a broad coalition of organizations, companies and individuals coming together this week to promote stronger security practices on the web; we’re happy to be a participant in that effort.<br /> <br /> <span class="byline-author">Posted by Brandon Long, Tech Lead, Gmail Delivery Team <br /> </span> <span itemprop='author' itemscope='itemscope' itemtype='http://schema.org/Person'> <meta content='https://plus.google.com/116899029375914044550' itemprop='url'/> </span> </script> <noscript> When you mail a letter to your friend, you hope she’ll be the only person who reads it. But a lot could happen to that letter on its way from you to her, and prying eyes might try to take a look. That’s why we send important messages in sealed envelopes, rather than on postcards.<br /> <br /> Email works in a similar way. Emails that are <a href="http://en.wikipedia.org/wiki/Encryption">encrypted</a> as they’re routed from sender to receiver are like sealed envelopes, and less vulnerable to snooping—whether by bad actors or through government surveillance—than postcards.<br /> <br /> But some email is more secure than others. So to help you better understand whether your emails are protected by encryption, we’re launching a <a href="//www.google.com/transparencyreport/saferemail/">new section</a> in the <a href="//www.google.com/transparencyreport">Transparency Report</a>.<br /> <div class="separator" style="clear: both; text-align: center;"> <a href="//www.google.com/transparencyreport/saferemail/" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEipnepiMKXzr2QBZaf-b08YrgyEF3lzoIcqr-8uBjvhzIPv5FdAauJZ7B3hxxVSjAqWdRHg8MkCAH7jn7XpBpdQkzK37IgfJ9AG7bLuPn6IMNYhQgaLdc7dU4tYW1ixD-5aVmfu/s640/Screen+Shot+2014-06-03+at+11.15.23+AM.png" /></a></div> Gmail has always supported encryption in transit by using <a href="http://en.wikipedia.org/wiki/Transport_Layer_Security">Transport Layer Security</a> (TLS), and will <a href="http://googleblog.blogspot.com/2014/03/staying-at-forefront-of-email-security.html">automatically encrypt</a> your incoming and outgoing emails if it can. The important thing is that <i>both</i> sides of an email exchange need to support encryption for it to work; Gmail can't do it alone.<br /> <br /> Our data show that approximately 40 to 50 percent of emails sent between Gmail and other email providers aren’t encrypted. Many providers have turned on encryption, and others have said they’re going to, which is great news. As they do, more and more emails will be shielded from snooping.<br /> <br /> For people looking for even stronger email security, <a href="http://en.wikipedia.org/wiki/End-to-end_encryption">end-to-end encryption</a> is a good option—but it’s been hard to use. So today we’re making available the source code for <a href="http://googleonlinesecurity.blogspot.com/2014/06/making-end-to-end-encryption-easier-to.html">End-to-End</a>, a Chrome extension. It's currently in testing, and once it's ready for general use it will make this technology easier for those who choose to use it.<br /> <br /> We encourage you to find tips about <a href="//www.google.com/goodtoknow/online-safety/passwords/">choosing strong passwords</a> and <a href="//www.google.com/goodtoknow/protection/identity/">adding another layer of protection</a> to your account in our <a href="//www.google.com/goodtoknow/familysafety/">Safety Center</a>. And check out <a href="https://www.resetthenet.org/">Reset the Net</a>, a broad coalition of organizations, companies and individuals coming together this week to promote stronger security practices on the web; we’re happy to be a participant in that effort.<br /> <br /> <span class="byline-author">Posted by Brandon Long, Tech Lead, Gmail Delivery Team <br /> </span> <span itemprop='author' itemscope='itemscope' itemtype='http://schema.org/Person'> <meta content='https://plus.google.com/116899029375914044550' itemprop='url'/> </span> </noscript> </div> </div> <div class='share'> <span class='gplus-share social-wrapper' data-href='https://plus.google.com/share?url=https://googleblog.blogspot.com/2014/06/transparency-report-protecting-emails.html'> <img alt='Share on Google+' height='24' src='https://www.gstatic.com/images/branding/google_plus/2x/ic_w_post_gplus_black_24dp.png' width='24'/> </span> <span class='twitter-custom social-wrapper' data-href='http://twitter.com/share?text=Official Google Blog:Transparency Report: Protecting emails as they travel across the web&url=https://googleblog.blogspot.com/2014/06/transparency-report-protecting-emails.html&via=google'> <img alt='Share on Twitter' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_twitter_black_24dp.png' width='24'/> </span> <span class='fb-custom social-wrapper' data-href='https://www.facebook.com/sharer.php?u=https://googleblog.blogspot.com/2014/06/transparency-report-protecting-emails.html'> <img alt='Share on Facebook' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_facebook_black_24dp.png' width='24'/> </span> </div> <div class='post-footer'> <div class='cmt_iframe_holder' data-href='https://googleblog.blogspot.com/2014/06/transparency-report-protecting-emails.html' data-viewtype='FILTERED_POSTMOD'></div> <a href='https://plus.google.com/112374322230920073195' rel='author' style='display:none;'> Google </a> <div class='label-footer'> <span class='labels-caption'> Labels: </span> <span class='labels'> <a class='label' href='https://googleblog.blogspot.com/search/label/apps' rel='tag'> apps </a> , <a class='label' href='https://googleblog.blogspot.com/search/label/security' rel='tag'> security </a> </span> </div> </div> </div> <div class='post' data-id='6789578941045183226' itemscope='' itemtype='http://schema.org/BlogPosting'> <h2 class='title' itemprop='name'> <a href='https://googleblog.blogspot.com/2013/05/helping-passwords-better-protect-you.html' itemprop='url' title='Helping passwords better protect you '> Helping passwords better protect you </a> </h2> <div class='post-header'> <div class='published'> <span class='publishdate' itemprop='datePublished'> May 30, 2013 </span> </div> </div> <div class='post-body'> <div class='post-content' itemprop='articleBody'> <script type='text/template'> <i>Knowing how to stay safe and secure online is important, which is why we created our Good to Know site with advice and tips for safe and savvy Internet use. Starting today, we'll also be posting regularly with privacy and security tips. We hope this information helps you understand the choices and control that you have over your online information.</i> -Ed.<br /> <br /> It could be your Gmail, your photos or your documents—whatever you have in your Google Account, we work hard to make sure it’s protected from would-be identity thieves, other bad guys, or any illegitimate attempts to access your information. <br /> <br /> But you can also help keep your information safe. Think of how upset you would be if someone else got access to your Google Account without your permission, and then take five minutes to follow the steps below and help make it more secure. Let’s start with the key to unlocking your account—your password:<br /> <br /> <b>1. Use a different password for each important service</b><br /> Make sure you have a different password for every important online account you have. Bad guys will steal your username and password from one site, and then use them to try to log into lots of other sites where you might have an account. Even large, reputable sites sometimes have their password databases stolen. If you use the same password across many different sites, there’s a greater chance it might end up on a list of stolen passwords. And the more accounts you have that use that password, the more data you might lose if that password is stolen. <br /> <br /> Giving an account its own, strong password helps protect you and your information in that account. Start today by making sure your Google Account has a unique password.<br /> <br /> <b>2. Make your password hard to guess </b><br /> “password.” “123456.” “My name is Inigo Montoya. You killed my father. Prepare to die!” These examples are terrible passwords because everyone knows them—including potential attackers. Making your passwords longer or more complicated makes them harder to guess for both bad guys and people who know you. We know it’s hard: the average password is shorter than 8 characters, and many just contain letters. In a database of 32 million real passwords that were made public in 2009, <a href="http://www.cl.cam.ac.uk/~jcb82/doc/B12-IEEESP-analyzing_70M_anonymized_passwords.pdf">analysis showed</a> (PDF) only 54 percent included numbers, and only 3.7 percent had special characters like & or $.<br /> <br /> One way to build a strong password is to think of a phrase or sentence that other people wouldn’t know and then use that to build your password. For example, for your email you could think of a personal message like “I want to get better at responding to emails quickly and concisely” and then build your password from numbers, symbols, and the first letters of each word—“iw2gb@r2eq&c”. Don’t use popular phrases or lyrics to build your password—<a href="http://usablesecurity.com/?p=75">research suggests</a> that people gravitate to the same phrases, and you want your password to be something only you know.<br /> <br /> Google doesn’t restrict password length, so go wild! <br /> <br /> <b>3. Keep your password somewhere safe</b><br /> <a href="http://cups.cs.cmu.edu/soups/2006/proceedings/p44_gaw.pdf">Research shows</a> (PDF) that worrying about remembering too many passwords is the chief reason people reuse certain passwords across multiple services. But don’t worry—if you’ve created so many passwords that it’s hard to remember them, it’s OK to make a list and write them down. Just make sure you keep your list in a safe place, where you won’t lose it and others won’t be able to find it. If you’d prefer to manage your passwords digitally, a trusted password manager might be a good option. <a href="https://support.google.com/chrome/answer/95606?hl=en">Chrome</a> and many web browsers have free password managers built into them, and there are many independent options as well—take a few minutes to read through reviews and see what would be best for your needs. <br /> <b><br /> 4. Set a recovery option</b><br /> Have you ever forgotten your password? Has one of your friends ever been locked out of their account? <a href="http://support.google.com/accounts/bin/answer.py?hl=en&answer=183723&ctx=cbo&cbid=423539972&cbrank=2">Setting a recovery option</a>, like an alternate email address or a telephone number, helps give the service provider another way to contact you if you are ever locked out of your account. Having an up-to-date recovery phone or email address is the best thing you can do to make sure you can get back into your account fast if there is ever a problem.<br /> <br /> If you haven’t set a recovery option for your Google Account, <a href="https://support.google.com/accounts/answer/183723?hl=en">add one now</a>. If you have, just take a second to make sure it’s up to date.<br /> <br /> We have more tips on how to pick a good password on our <a href="https://support.google.com/accounts/answer/32040?hl=en">Help Center</a>, and in the video below:<br /> <iframe allowfullscreen="" frameborder="0" height="360" src="//www.youtube.com/embed/0RCsHJfHL_4" width="640"></iframe><br /> Your online safety and privacy is important to you, and it’s important to us, too. We’ve made a <a href="http://googleblog.blogspot.com/2013/02/an-update-on-our-war-against-account.html">huge amount of progress</a> to help protect your Google Account from people who want to break into it, but for the time being, creating a unique, strong password is still an important way to protect your online accounts. Please take five minutes today to reset your important passwords using the tips above, and stay tuned for more security tips throughout the summer.<br /> <br /> <span class="byline-author">Posted by Diana Smetters, Software Engineer</span> <span itemprop='author' itemscope='itemscope' itemtype='http://schema.org/Person'> <meta content='https://plus.google.com/116899029375914044550' itemprop='url'/> </span> </script> <noscript> <i>Knowing how to stay safe and secure online is important, which is why we created our Good to Know site with advice and tips for safe and savvy Internet use. Starting today, we'll also be posting regularly with privacy and security tips. We hope this information helps you understand the choices and control that you have over your online information.</i> -Ed.<br /> <br /> It could be your Gmail, your photos or your documents—whatever you have in your Google Account, we work hard to make sure it’s protected from would-be identity thieves, other bad guys, or any illegitimate attempts to access your information. <br /> <br /> But you can also help keep your information safe. Think of how upset you would be if someone else got access to your Google Account without your permission, and then take five minutes to follow the steps below and help make it more secure. Let’s start with the key to unlocking your account—your password:<br /> <br /> <b>1. Use a different password for each important service</b><br /> Make sure you have a different password for every important online account you have. Bad guys will steal your username and password from one site, and then use them to try to log into lots of other sites where you might have an account. Even large, reputable sites sometimes have their password databases stolen. If you use the same password across many different sites, there’s a greater chance it might end up on a list of stolen passwords. And the more accounts you have that use that password, the more data you might lose if that password is stolen. <br /> <br /> Giving an account its own, strong password helps protect you and your information in that account. Start today by making sure your Google Account has a unique password.<br /> <br /> <b>2. Make your password hard to guess </b><br /> “password.” “123456.” “My name is Inigo Montoya. You killed my father. Prepare to die!” These examples are terrible passwords because everyone knows them—including potential attackers. Making your passwords longer or more complicated makes them harder to guess for both bad guys and people who know you. We know it’s hard: the average password is shorter than 8 characters, and many just contain letters. In a database of 32 million real passwords that were made public in 2009, <a href="http://www.cl.cam.ac.uk/~jcb82/doc/B12-IEEESP-analyzing_70M_anonymized_passwords.pdf">analysis showed</a> (PDF) only 54 percent included numbers, and only 3.7 percent had special characters like & or $.<br /> <br /> One way to build a strong password is to think of a phrase or sentence that other people wouldn’t know and then use that to build your password. For example, for your email you could think of a personal message like “I want to get better at responding to emails quickly and concisely” and then build your password from numbers, symbols, and the first letters of each word—“iw2gb@r2eq&c”. Don’t use popular phrases or lyrics to build your password—<a href="http://usablesecurity.com/?p=75">research suggests</a> that people gravitate to the same phrases, and you want your password to be something only you know.<br /> <br /> Google doesn’t restrict password length, so go wild! <br /> <br /> <b>3. Keep your password somewhere safe</b><br /> <a href="http://cups.cs.cmu.edu/soups/2006/proceedings/p44_gaw.pdf">Research shows</a> (PDF) that worrying about remembering too many passwords is the chief reason people reuse certain passwords across multiple services. But don’t worry—if you’ve created so many passwords that it’s hard to remember them, it’s OK to make a list and write them down. Just make sure you keep your list in a safe place, where you won’t lose it and others won’t be able to find it. If you’d prefer to manage your passwords digitally, a trusted password manager might be a good option. <a href="https://support.google.com/chrome/answer/95606?hl=en">Chrome</a> and many web browsers have free password managers built into them, and there are many independent options as well—take a few minutes to read through reviews and see what would be best for your needs. <br /> <b><br /> 4. Set a recovery option</b><br /> Have you ever forgotten your password? Has one of your friends ever been locked out of their account? <a href="http://support.google.com/accounts/bin/answer.py?hl=en&answer=183723&ctx=cbo&cbid=423539972&cbrank=2">Setting a recovery option</a>, like an alternate email address or a telephone number, helps give the service provider another way to contact you if you are ever locked out of your account. Having an up-to-date recovery phone or email address is the best thing you can do to make sure you can get back into your account fast if there is ever a problem.<br /> <br /> If you haven’t set a recovery option for your Google Account, <a href="https://support.google.com/accounts/answer/183723?hl=en">add one now</a>. If you have, just take a second to make sure it’s up to date.<br /> <br /> We have more tips on how to pick a good password on our <a href="https://support.google.com/accounts/answer/32040?hl=en">Help Center</a>, and in the video below:<br /> <iframe allowfullscreen="" frameborder="0" height="360" src="//www.youtube.com/embed/0RCsHJfHL_4" width="640"></iframe><br /> Your online safety and privacy is important to you, and it’s important to us, too. We’ve made a <a href="http://googleblog.blogspot.com/2013/02/an-update-on-our-war-against-account.html">huge amount of progress</a> to help protect your Google Account from people who want to break into it, but for the time being, creating a unique, strong password is still an important way to protect your online accounts. Please take five minutes today to reset your important passwords using the tips above, and stay tuned for more security tips throughout the summer.<br /> <br /> <span class="byline-author">Posted by Diana Smetters, Software Engineer</span> <span itemprop='author' itemscope='itemscope' itemtype='http://schema.org/Person'> <meta content='https://plus.google.com/116899029375914044550' itemprop='url'/> </span> </noscript> </div> </div> <div class='share'> <span class='gplus-share social-wrapper' data-href='https://plus.google.com/share?url=https://googleblog.blogspot.com/2013/05/helping-passwords-better-protect-you.html'> <img alt='Share on Google+' height='24' src='https://www.gstatic.com/images/branding/google_plus/2x/ic_w_post_gplus_black_24dp.png' width='24'/> </span> <span class='twitter-custom social-wrapper' data-href='http://twitter.com/share?text=Official Google Blog:Helping passwords better protect you &url=https://googleblog.blogspot.com/2013/05/helping-passwords-better-protect-you.html&via=google'> <img alt='Share on Twitter' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_twitter_black_24dp.png' width='24'/> </span> <span class='fb-custom social-wrapper' data-href='https://www.facebook.com/sharer.php?u=https://googleblog.blogspot.com/2013/05/helping-passwords-better-protect-you.html'> <img alt='Share on Facebook' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_facebook_black_24dp.png' width='24'/> </span> </div> <div class='post-footer'> <div class='cmt_iframe_holder' data-href='https://googleblog.blogspot.com/2013/05/helping-passwords-better-protect-you.html' data-viewtype='FILTERED_POSTMOD'></div> <a href='https://plus.google.com/112374322230920073195' rel='author' style='display:none;'> Google </a> <div class='label-footer'> <span class='labels-caption'> Labels: </span> <span class='labels'> <a class='label' href='https://googleblog.blogspot.com/search/label/privacy%20and%20security' rel='tag'> privacy and security </a> , <a class='label' href='https://googleblog.blogspot.com/search/label/security' rel='tag'> security </a> , <a class='label' href='https://googleblog.blogspot.com/search/label/security%20and%20safety%20tips' rel='tag'> security and safety tips </a> </span> </div> </div> </div> <div class='post' data-id='5892558223017725840' itemscope='' itemtype='http://schema.org/BlogPosting'> <h2 class='title' itemprop='name'> <a href='https://googleblog.blogspot.com/2013/02/an-update-on-our-war-against-account.html' itemprop='url' title='An update on our war against account hijackers '> An update on our war against account hijackers </a> </h2> <div class='post-header'> <div class='published'> <span class='publishdate' itemprop='datePublished'> February 19, 2013 </span> </div> </div> <div class='post-body'> <div class='post-content' itemprop='articleBody'> <script type='text/template'> Have you ever gotten a plea to wire money to a friend stranded at an international airport? An oddly written message from someone you haven’t heard from in ages? Compared to five years ago, more scams, illegal, fraudulent or spammy messages today come from someone you know. Although spam filters have become very powerful—in Gmail, less than 1 percent of spam emails make it into an inbox—these unwanted messages are much more likely to make it through if they come from someone you’ve been in contact with before. As a result, in 2010 spammers started changing their tactics—and we saw a large increase in fraudulent mail sent from Google Accounts. In turn, our security team has developed new ways to keep you safe, and dramatically reduced the amount of these messages.<br /> <br /> <b>Spammers’ new trick—hijacking accounts </b><br /> To improve their chances of beating a spam filter by sending you spam from your contact’s account, the spammer first has to break into that account. This means many spammers are turning into account thieves. Every day, cyber criminals break into websites to steal databases of usernames and passwords—the online “keys” to accounts. They put the databases up for sale on the black market, or use them for their own nefarious purposes. Because many people re-use the same password across different accounts, stolen passwords from one site are often valid on others. <br /> <br /> With stolen passwords in hand, attackers attempt to break into accounts across the web and across many different services. We’ve seen a single attacker using stolen passwords to attempt to break into a million different Google accounts every single day, for weeks at a time. A different gang attempted sign-ins at a rate of more than 100 accounts per second. Other services are often more vulnerable to this type of attack, but when someone tries to log into your Google Account, our security system does more than just check that a password is correct. <br /> <br /> <div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhoadS84Y5JncNQQ5hjC3a5r7iPh9AKnMJJIEpGyLNQ-w2iPxE9vdenlTap2gJAjPlMNqPmY6JfI-F7ndmoxl8vf57_cuAV4IESFsYll9PDMpY6hepM15s5fHi7JY-yFcIcX8Oz/s1600/Blogpost+graph-1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhoadS84Y5JncNQQ5hjC3a5r7iPh9AKnMJJIEpGyLNQ-w2iPxE9vdenlTap2gJAjPlMNqPmY6JfI-F7ndmoxl8vf57_cuAV4IESFsYll9PDMpY6hepM15s5fHi7JY-yFcIcX8Oz/s500/Blogpost+graph-1.png" width="500" /></a></div><div style="text-align: center;"><span style="text-align: start;"><i>Legitimate accounts blocked for sending spam: </i></span><i>Our security systems have dramatically reduced the number of Google Accounts used to send spam over the past few years</i></div><br /> <b>How Google Security helps protect your account</b><br /> Every time you sign in to Google, whether via your web browser once a month or an email program that checks for new mail every five minutes, our system performs a complex risk analysis to determine how likely it is that the sign-in really comes from you. In fact, there are more than 120 variables that can factor into how a decision is made.<br /> <br /> If a sign-in is deemed suspicious or risky for some reason—maybe it’s coming from a country oceans away from your last sign-in—we ask some simple questions about your account. For example, we may ask for the phone number associated with your account, or for the answer to your security question. These questions are normally hard for a hijacker to solve, but are easy for the real owner. Using security measures like these, we've dramatically reduced the number of compromised accounts by 99.7 percent since the peak of these hijacking attempts in 2011.<br /> <br /> <div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgJurLFCDryy9X755clEpTRwRjVaA_rNY1y4CF9WK2l5uQqxkzxAAf29IT42suJr-n1ZOtlqygMXFBUe452XBTpvgqW3ZAUpLDquzF92DVTqHONXy9RAxyLCzcGIcCByr6Y0s90/s1600/Untitled-3.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgJurLFCDryy9X755clEpTRwRjVaA_rNY1y4CF9WK2l5uQqxkzxAAf29IT42suJr-n1ZOtlqygMXFBUe452XBTpvgqW3ZAUpLDquzF92DVTqHONXy9RAxyLCzcGIcCByr6Y0s90/s500/Untitled-3.png" width="500" /></a></div><br /> <b>Help protect your account</b><br /> While we do our best to keep spammers at bay, you can help protect your account by making sure you’re using a <a href="//www.google.com/goodtoknow/online-safety/passwords/">strong, unique password</a> for your Google Account, upgrading your account to <a href="//www.google.com/landing/2step/">use 2-step verification</a>, and <a href="https://accounts.google.com/UpdateAccountRecoveryOptions?hl=en&service=oz">updating the recovery options</a> on your account such as your secondary email address and your phone number. Following these three steps can help prevent your account from being hijacked—this means less spam for your friends and contacts, and improved security and privacy for you. <br /> <br /> <span class="byline-author">Posted by Mike Hearn, Google Security Engineer </span> <span itemprop='author' itemscope='itemscope' itemtype='http://schema.org/Person'> <meta content='https://plus.google.com/116899029375914044550' itemprop='url'/> </span> </script> <noscript> Have you ever gotten a plea to wire money to a friend stranded at an international airport? An oddly written message from someone you haven’t heard from in ages? Compared to five years ago, more scams, illegal, fraudulent or spammy messages today come from someone you know. Although spam filters have become very powerful—in Gmail, less than 1 percent of spam emails make it into an inbox—these unwanted messages are much more likely to make it through if they come from someone you’ve been in contact with before. As a result, in 2010 spammers started changing their tactics—and we saw a large increase in fraudulent mail sent from Google Accounts. In turn, our security team has developed new ways to keep you safe, and dramatically reduced the amount of these messages.<br /> <br /> <b>Spammers’ new trick—hijacking accounts </b><br /> To improve their chances of beating a spam filter by sending you spam from your contact’s account, the spammer first has to break into that account. This means many spammers are turning into account thieves. Every day, cyber criminals break into websites to steal databases of usernames and passwords—the online “keys” to accounts. They put the databases up for sale on the black market, or use them for their own nefarious purposes. Because many people re-use the same password across different accounts, stolen passwords from one site are often valid on others. <br /> <br /> With stolen passwords in hand, attackers attempt to break into accounts across the web and across many different services. We’ve seen a single attacker using stolen passwords to attempt to break into a million different Google accounts every single day, for weeks at a time. A different gang attempted sign-ins at a rate of more than 100 accounts per second. Other services are often more vulnerable to this type of attack, but when someone tries to log into your Google Account, our security system does more than just check that a password is correct. <br /> <br /> <div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhoadS84Y5JncNQQ5hjC3a5r7iPh9AKnMJJIEpGyLNQ-w2iPxE9vdenlTap2gJAjPlMNqPmY6JfI-F7ndmoxl8vf57_cuAV4IESFsYll9PDMpY6hepM15s5fHi7JY-yFcIcX8Oz/s1600/Blogpost+graph-1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhoadS84Y5JncNQQ5hjC3a5r7iPh9AKnMJJIEpGyLNQ-w2iPxE9vdenlTap2gJAjPlMNqPmY6JfI-F7ndmoxl8vf57_cuAV4IESFsYll9PDMpY6hepM15s5fHi7JY-yFcIcX8Oz/s500/Blogpost+graph-1.png" width="500" /></a></div><div style="text-align: center;"><span style="text-align: start;"><i>Legitimate accounts blocked for sending spam: </i></span><i>Our security systems have dramatically reduced the number of Google Accounts used to send spam over the past few years</i></div><br /> <b>How Google Security helps protect your account</b><br /> Every time you sign in to Google, whether via your web browser once a month or an email program that checks for new mail every five minutes, our system performs a complex risk analysis to determine how likely it is that the sign-in really comes from you. In fact, there are more than 120 variables that can factor into how a decision is made.<br /> <br /> If a sign-in is deemed suspicious or risky for some reason—maybe it’s coming from a country oceans away from your last sign-in—we ask some simple questions about your account. For example, we may ask for the phone number associated with your account, or for the answer to your security question. These questions are normally hard for a hijacker to solve, but are easy for the real owner. Using security measures like these, we've dramatically reduced the number of compromised accounts by 99.7 percent since the peak of these hijacking attempts in 2011.<br /> <br /> <div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgJurLFCDryy9X755clEpTRwRjVaA_rNY1y4CF9WK2l5uQqxkzxAAf29IT42suJr-n1ZOtlqygMXFBUe452XBTpvgqW3ZAUpLDquzF92DVTqHONXy9RAxyLCzcGIcCByr6Y0s90/s1600/Untitled-3.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgJurLFCDryy9X755clEpTRwRjVaA_rNY1y4CF9WK2l5uQqxkzxAAf29IT42suJr-n1ZOtlqygMXFBUe452XBTpvgqW3ZAUpLDquzF92DVTqHONXy9RAxyLCzcGIcCByr6Y0s90/s500/Untitled-3.png" width="500" /></a></div><br /> <b>Help protect your account</b><br /> While we do our best to keep spammers at bay, you can help protect your account by making sure you’re using a <a href="//www.google.com/goodtoknow/online-safety/passwords/">strong, unique password</a> for your Google Account, upgrading your account to <a href="//www.google.com/landing/2step/">use 2-step verification</a>, and <a href="https://accounts.google.com/UpdateAccountRecoveryOptions?hl=en&service=oz">updating the recovery options</a> on your account such as your secondary email address and your phone number. Following these three steps can help prevent your account from being hijacked—this means less spam for your friends and contacts, and improved security and privacy for you. <br /> <br /> <span class="byline-author">Posted by Mike Hearn, Google Security Engineer </span> <span itemprop='author' itemscope='itemscope' itemtype='http://schema.org/Person'> <meta content='https://plus.google.com/116899029375914044550' itemprop='url'/> </span> </noscript> </div> </div> <div class='share'> <span class='gplus-share social-wrapper' data-href='https://plus.google.com/share?url=https://googleblog.blogspot.com/2013/02/an-update-on-our-war-against-account.html'> <img alt='Share on Google+' height='24' src='https://www.gstatic.com/images/branding/google_plus/2x/ic_w_post_gplus_black_24dp.png' width='24'/> </span> <span class='twitter-custom social-wrapper' data-href='http://twitter.com/share?text=Official Google Blog:An update on our war against account hijackers &url=https://googleblog.blogspot.com/2013/02/an-update-on-our-war-against-account.html&via=google'> <img alt='Share on Twitter' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_twitter_black_24dp.png' width='24'/> </span> <span class='fb-custom social-wrapper' data-href='https://www.facebook.com/sharer.php?u=https://googleblog.blogspot.com/2013/02/an-update-on-our-war-against-account.html'> <img alt='Share on Facebook' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_facebook_black_24dp.png' width='24'/> </span> </div> <div class='post-footer'> <div class='cmt_iframe_holder' data-href='https://googleblog.blogspot.com/2013/02/an-update-on-our-war-against-account.html' data-viewtype='FILTERED_POSTMOD'></div> <a href='https://plus.google.com/112374322230920073195' rel='author' style='display:none;'> Google </a> <div class='label-footer'> <span class='labels-caption'> Labels: </span> <span class='labels'> <a class='label' href='https://googleblog.blogspot.com/search/label/privacy%20and%20security' rel='tag'> privacy and security </a> , <a class='label' href='https://googleblog.blogspot.com/search/label/security' rel='tag'> security </a> </span> </div> </div> </div> <div class='post' data-id='5309563002795722637' itemscope='' itemtype='http://schema.org/BlogPosting'> <h2 class='title' itemprop='name'> <a href='https://googleblog.blogspot.com/2012/06/safe-browsingprotecting-web-users-for.html' itemprop='url' title='Safe Browsing—protecting web users for five years and counting'> Safe Browsing—protecting web users for five years and counting </a> </h2> <div class='post-header'> <div class='published'> <span class='publishdate' itemprop='datePublished'> June 19, 2012 </span> </div> </div> <div class='post-body'> <div class='post-content' itemprop='articleBody'> <script type='text/template'> <i>In this post, we've collected some highlights from the past five years of </i><i>our Safe Browsing efforts, aimed at keeping people safe online. </i><i style="background-color: white;">See the <a href="http://googleonlinesecurity.blogspot.com/2012/06/safe-browsing-protecting-web-users-for.html">Security Blog</a> for the full details and more visuals. -Ed.</i><br /> <br /> Five years ago, we launched <a href="http://googleonlinesecurity.blogspot.com/2007/05/introducing-googles-anti-malware.html">Safe Browsing</a>, an initiative designed to keep people safe from malicious content online. Our primary goal was to safeguard Google's search results against malware (software capable of taking control of your computer) and phishing (fraudulent websites that entice users to give up their personal information). We also wanted to help <a href="http://googleonlinesecurity.blogspot.com/2009/10/best-practices-for-verifying-and.html">educate webmasters</a> on how to protect their own sites. <br /> <br /> Malware and phishing are still big problems online, but our Safe Browsing team has labored continuously to adapt to the rising challenges of new threats. We've also developed an infrastructure that automatically detects harmful content around the globe. <br /> <br /> Here’s a look at the highlights from our efforts over the past five years:<br /> <ul> <li><b>We protect 600 million users through built-in protection for Chrome, Firefox and Safari, where we show several million security warnings every day to Internet users.</b> When we detect malware or phishing, we trigger a red warning screen that discourages clicking through to the website. Our free and public <a href="https://developers.google.com/safe-browsing/developers_guide_v2">Safe Browsing API</a> allows other organizations to keep their users safe by using the data we’ve compiled. </li> <li><b>We find about 9,500 new malicious websites every day</b> and show warnings to protect users. These are either innocent websites that have been compromised by malware authors, or others that are built specifically for malware distribution or phishing. Our detection techniques are highly accurate—we have had only a handful of false positives.</li> <li><b>Approximately 12-14 million Google Search queries per day warn users about current malware threats,</b> and <b>we provide malware warnings for about 300 thousand downloads per day</b> through our <a href="http://blog.chromium.org/2012/01/all-about-safe-browsing.html">download protection service for Chrome</a>.</li> <li><b>We send thousands of notifications daily to webmasters.</b> When webmasters sign up for <a href="http://googleonlinesecurity.blogspot.com/2009/10/show-me-malware.html">Webmaster Tools</a> we give them the option to receive warning notices if we find something malicious on their site.</li> </ul> Malware and phishing aren’t completely solvable problems because threats continue to evolve, but our technologies and processes do, too.<br /> <br /> <b>Phishing and malware trends</b><br /> Online commerce sites are still favorite phishing targets because phishers are motivated by money. Some tried-and-true phishing methods are still used, but attacks are also getting more creative and sophisticated. Attacks are faster, with phishers sometimes remaining online for less than an hour to try to avoid detection. They’re also more geographically dispersed and are <span style="background-color: white;">getting more targeted.</span><br /> <br /> <div style="text-align: center;"> <a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiOKNe4PEj0gEE-0Asjo5BiMTOu0QPgwR95LT9qM9ufjyILDPA2upS6otma9WVPPaAmjdpWVPBvibc3CXyCL68PYnjo5TvULzZBojdryX3uT42kFbHmE0qekrzODbzVgRYKIxiw/s1600/Phishing+Map.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="194" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiOKNe4PEj0gEE-0Asjo5BiMTOu0QPgwR95LT9qM9ufjyILDPA2upS6otma9WVPPaAmjdpWVPBvibc3CXyCL68PYnjo5TvULzZBojdryX3uT42kFbHmE0qekrzODbzVgRYKIxiw/s400/Phishing+Map.png" width="500" /></a></div> <br /> Malware authors often compromise legitimate sites to deliver content from a malicious attack site or to redirect to an attack site. These attack sites will often deliver "<a href="http://en.wikipedia.org/wiki/Drive-by_download">drive-by downloads</a>" to visitors, which launch and run malware programs on their computers without their knowledge. To try to avoid detection, these attack sites adopt several techniques, such as rapidly changing their Internet location with free web hosting services and auto-generated domain names. Although less common than drive-by downloads, we’re also seeing more malware authors bypassing software vulnerabilities altogether and instead employing methods to try to trick users into installing malicious software—for example, fake anti-virus software.<br /> <br /> <b>How you can help prevent malware and phishing</b><br /> Our system is designed to protect users at high volumes, but people still need to take steps to keep their computers safe. Ignoring a malware problem is never a good idea—if one of our warnings pop up, you should never click through to the suspicious site. Webmasters can help protect their visitors by signing up for malware warnings at Google Webmaster Tools. These warnings are free and will help us inform them if we find suspicious code on their sites. Finally, everyone can help make our system better. You can opt-in to send additional data to our team that helps us expand the coverage of Safe Browsing.<br /> <br /> <div style="text-align: center;"> <a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj3EMi793a8sxK0z9EAXfdhuxwxYwLkYYH63Hy9OR-vvtymgl0uQbPNFnQ9mdwR3MLYm2ubK-Wr_-XiyNDt2l72Ye9-NQdOKW7JvfqSKixvuS3s0DTfLNPy49MeXeXFh8gMUom2/s1600/user-protection.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="309" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj3EMi793a8sxK0z9EAXfdhuxwxYwLkYYH63Hy9OR-vvtymgl0uQbPNFnQ9mdwR3MLYm2ubK-Wr_-XiyNDt2l72Ye9-NQdOKW7JvfqSKixvuS3s0DTfLNPy49MeXeXFh8gMUom2/s400/user-protection.png" width="500" /></a></div> <br /> <b>Looking forward</b><br /> Some of our recent work to counter new forms of abuse includes:<br /> <ul> <li>Instantaneous <a href="http://googleonlinesecurity.blogspot.com/2011/04/protecting-users-from-malicious.html">phishing detection and download protection</a> within the Chrome browser</li> <li>Chrome extension malware scanning</li> <li>Android application protection</li> </ul> It’s a good feeling to know that we’re making the web more secure and directly protecting people from harm—whether they’re our users or not. We continue to invest heavily in the Safe Browsing team so we can defend against current and future security threats. <br /> <br /> <span class="byline-author">Posted by Niels Provos, Security Team</span> <span itemprop='author' itemscope='itemscope' itemtype='http://schema.org/Person'> <meta content='https://plus.google.com/116899029375914044550' itemprop='url'/> </span> </script> <noscript> <i>In this post, we've collected some highlights from the past five years of </i><i>our Safe Browsing efforts, aimed at keeping people safe online. </i><i style="background-color: white;">See the <a href="http://googleonlinesecurity.blogspot.com/2012/06/safe-browsing-protecting-web-users-for.html">Security Blog</a> for the full details and more visuals. -Ed.</i><br /> <br /> Five years ago, we launched <a href="http://googleonlinesecurity.blogspot.com/2007/05/introducing-googles-anti-malware.html">Safe Browsing</a>, an initiative designed to keep people safe from malicious content online. Our primary goal was to safeguard Google's search results against malware (software capable of taking control of your computer) and phishing (fraudulent websites that entice users to give up their personal information). We also wanted to help <a href="http://googleonlinesecurity.blogspot.com/2009/10/best-practices-for-verifying-and.html">educate webmasters</a> on how to protect their own sites. <br /> <br /> Malware and phishing are still big problems online, but our Safe Browsing team has labored continuously to adapt to the rising challenges of new threats. We've also developed an infrastructure that automatically detects harmful content around the globe. <br /> <br /> Here’s a look at the highlights from our efforts over the past five years:<br /> <ul> <li><b>We protect 600 million users through built-in protection for Chrome, Firefox and Safari, where we show several million security warnings every day to Internet users.</b> When we detect malware or phishing, we trigger a red warning screen that discourages clicking through to the website. Our free and public <a href="https://developers.google.com/safe-browsing/developers_guide_v2">Safe Browsing API</a> allows other organizations to keep their users safe by using the data we’ve compiled. </li> <li><b>We find about 9,500 new malicious websites every day</b> and show warnings to protect users. These are either innocent websites that have been compromised by malware authors, or others that are built specifically for malware distribution or phishing. Our detection techniques are highly accurate—we have had only a handful of false positives.</li> <li><b>Approximately 12-14 million Google Search queries per day warn users about current malware threats,</b> and <b>we provide malware warnings for about 300 thousand downloads per day</b> through our <a href="http://blog.chromium.org/2012/01/all-about-safe-browsing.html">download protection service for Chrome</a>.</li> <li><b>We send thousands of notifications daily to webmasters.</b> When webmasters sign up for <a href="http://googleonlinesecurity.blogspot.com/2009/10/show-me-malware.html">Webmaster Tools</a> we give them the option to receive warning notices if we find something malicious on their site.</li> </ul> Malware and phishing aren’t completely solvable problems because threats continue to evolve, but our technologies and processes do, too.<br /> <br /> <b>Phishing and malware trends</b><br /> Online commerce sites are still favorite phishing targets because phishers are motivated by money. Some tried-and-true phishing methods are still used, but attacks are also getting more creative and sophisticated. Attacks are faster, with phishers sometimes remaining online for less than an hour to try to avoid detection. They’re also more geographically dispersed and are <span style="background-color: white;">getting more targeted.</span><br /> <br /> <div style="text-align: center;"> <a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiOKNe4PEj0gEE-0Asjo5BiMTOu0QPgwR95LT9qM9ufjyILDPA2upS6otma9WVPPaAmjdpWVPBvibc3CXyCL68PYnjo5TvULzZBojdryX3uT42kFbHmE0qekrzODbzVgRYKIxiw/s1600/Phishing+Map.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="194" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiOKNe4PEj0gEE-0Asjo5BiMTOu0QPgwR95LT9qM9ufjyILDPA2upS6otma9WVPPaAmjdpWVPBvibc3CXyCL68PYnjo5TvULzZBojdryX3uT42kFbHmE0qekrzODbzVgRYKIxiw/s400/Phishing+Map.png" width="500" /></a></div> <br /> Malware authors often compromise legitimate sites to deliver content from a malicious attack site or to redirect to an attack site. These attack sites will often deliver "<a href="http://en.wikipedia.org/wiki/Drive-by_download">drive-by downloads</a>" to visitors, which launch and run malware programs on their computers without their knowledge. To try to avoid detection, these attack sites adopt several techniques, such as rapidly changing their Internet location with free web hosting services and auto-generated domain names. Although less common than drive-by downloads, we’re also seeing more malware authors bypassing software vulnerabilities altogether and instead employing methods to try to trick users into installing malicious software—for example, fake anti-virus software.<br /> <br /> <b>How you can help prevent malware and phishing</b><br /> Our system is designed to protect users at high volumes, but people still need to take steps to keep their computers safe. Ignoring a malware problem is never a good idea—if one of our warnings pop up, you should never click through to the suspicious site. Webmasters can help protect their visitors by signing up for malware warnings at Google Webmaster Tools. These warnings are free and will help us inform them if we find suspicious code on their sites. Finally, everyone can help make our system better. You can opt-in to send additional data to our team that helps us expand the coverage of Safe Browsing.<br /> <br /> <div style="text-align: center;"> <a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj3EMi793a8sxK0z9EAXfdhuxwxYwLkYYH63Hy9OR-vvtymgl0uQbPNFnQ9mdwR3MLYm2ubK-Wr_-XiyNDt2l72Ye9-NQdOKW7JvfqSKixvuS3s0DTfLNPy49MeXeXFh8gMUom2/s1600/user-protection.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="309" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj3EMi793a8sxK0z9EAXfdhuxwxYwLkYYH63Hy9OR-vvtymgl0uQbPNFnQ9mdwR3MLYm2ubK-Wr_-XiyNDt2l72Ye9-NQdOKW7JvfqSKixvuS3s0DTfLNPy49MeXeXFh8gMUom2/s400/user-protection.png" width="500" /></a></div> <br /> <b>Looking forward</b><br /> Some of our recent work to counter new forms of abuse includes:<br /> <ul> <li>Instantaneous <a href="http://googleonlinesecurity.blogspot.com/2011/04/protecting-users-from-malicious.html">phishing detection and download protection</a> within the Chrome browser</li> <li>Chrome extension malware scanning</li> <li>Android application protection</li> </ul> It’s a good feeling to know that we’re making the web more secure and directly protecting people from harm—whether they’re our users or not. We continue to invest heavily in the Safe Browsing team so we can defend against current and future security threats. <br /> <br /> <span class="byline-author">Posted by Niels Provos, Security Team</span> <span itemprop='author' itemscope='itemscope' itemtype='http://schema.org/Person'> <meta content='https://plus.google.com/116899029375914044550' itemprop='url'/> </span> </noscript> </div> </div> <div class='share'> <span class='gplus-share social-wrapper' data-href='https://plus.google.com/share?url=https://googleblog.blogspot.com/2012/06/safe-browsingprotecting-web-users-for.html'> <img alt='Share on Google+' height='24' src='https://www.gstatic.com/images/branding/google_plus/2x/ic_w_post_gplus_black_24dp.png' width='24'/> </span> <span class='twitter-custom social-wrapper' data-href='http://twitter.com/share?text=Official Google Blog:Safe Browsing—protecting web users for five years and counting&url=https://googleblog.blogspot.com/2012/06/safe-browsingprotecting-web-users-for.html&via=google'> <img alt='Share on Twitter' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_twitter_black_24dp.png' width='24'/> </span> <span class='fb-custom social-wrapper' data-href='https://www.facebook.com/sharer.php?u=https://googleblog.blogspot.com/2012/06/safe-browsingprotecting-web-users-for.html'> <img alt='Share on Facebook' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_facebook_black_24dp.png' width='24'/> </span> </div> <div class='post-footer'> <div class='cmt_iframe_holder' data-href='https://googleblog.blogspot.com/2012/06/safe-browsingprotecting-web-users-for.html' data-viewtype='FILTERED_POSTMOD'></div> <a href='https://plus.google.com/112374322230920073195' rel='author' style='display:none;'> Google </a> <div class='label-footer'> <span class='labels-caption'> Labels: </span> <span class='labels'> <a class='label' href='https://googleblog.blogspot.com/search/label/online%20safety' rel='tag'> online safety </a> , <a class='label' href='https://googleblog.blogspot.com/search/label/security' rel='tag'> security </a> </span> </div> </div> </div> <div class='post' data-id='2934241382793718129' itemscope='' itemtype='http://schema.org/BlogPosting'> <h2 class='title' itemprop='name'> <a href='https://googleblog.blogspot.com/2012/01/tech-tips-that-are-good-to-know.html' itemprop='url' title='Tech tips that are Good to Know'> Tech tips that are Good to Know </a> </h2> <div class='post-header'> <div class='published'> <span class='publishdate' itemprop='datePublished'> January 16, 2012 </span> </div> </div> <div class='post-body'> <div class='post-content' itemprop='articleBody'> <script type='text/template'> Does this person sound familiar? He can’t be bothered to type a password into his phone every time he wants to play a game of Angry Birds. When he does need a password, maybe for his email or bank website, he chooses one that’s easy to remember like his sister’s name—and he uses the same one for each website he visits. For him, cookies come from the bakery, IP addresses are the locations of Intellectual Property and a correct Google search result is basically magic.<br /> <br /> Most of us know someone like this. Technology can be confusing, and the industry often fails to explain clearly enough why digital literacy matters. So today in the U.S. we’re kicking off <a href="//google.com/goodtoknow">Good to Know</a>, our biggest-ever consumer education campaign focused on making the web a safer, more comfortable place. Our ad campaign, which we introduced in the U.K. and Germany last fall, offers privacy and security tips: Use <a href="//www.google.com/goodtoknow/online-safety/security-tools/">2-step verification</a>! Remember to lock your computer when you step away! Make sure your connection to a website is <a href="//www.google.com/goodtoknow/online-safety/secure-sites/">secure</a>! It also <a href="//www.google.com/goodtoknow/data-on-the-web/">explains</a> some of the building blocks of the web like cookies and IP addresses. Keep an eye out for the ads in newspapers and magazines, online and in New York and Washington, D.C. subway stations.<br /> <br /> <embed flashvars="host=picasaweb.google.com&hl=en_US&feat=flashalbum&RGB=0x000000&feed=https%3A%2F%2Fpicasaweb.google.com%2Fdata%2Ffeed%2Fapi%2Fuser%2F116887554964117158278%2Falbumid%2F5698403762820753729%3Falt%3Drss%26kind%3Dphoto%26authkey%3DGv1sRgCKWdqPvJqo2aHg%26hl%3Den_US" height="334" pluginspage="http://www.macromedia.com/go/getflashplayer" src="https://picasaweb.google.com/s/c/bin/slideshow.swf" type="application/x-shockwave-flash" width="500"></embed><br /> <br /> The campaign and <a href="//www.google.com/goodtoknow">Good to Know website</a> build on our commitment to keeping people safe online. We’ve created resources like <a href="//youtube.com/googleprivacy">privacy videos</a>, the <a href="//www.google.com/security/">Google Security Center</a>, the <a href="//www.google.com/familysafety/">Family Safety Center</a> and <a href="http://www.teachparentstech.org/">Teach Parents Tech</a> to help you develop strong privacy and security habits. We design for privacy, building tools like <a href="//google.com/dashboard">Google Dashboard</a>, <a href="http://googlepublicpolicy.blogspot.com/2011/06/me-myself-and-i-helping-to-manage-your.html">Me on the Web</a>, the <a href="//www.google.com/ads/preferences">Ads Preferences Manager</a> and <a href="//www.youtube.com/watch?v=BeMZP-oyOII">Google+ Circles</a>—with more on the way.<br /> <br /> We encourage you to take a few minutes to check out the <a href="//www.google.com/goodtoknow">Good to Know site</a>, watch <a href="//www.youtube.com/watch?v=qjxDrmAaZIs&feature=endscreen&NR=1">some</a> <a href="//www.youtube.com/watch?v=tz0FEnve_rs&feature=relmfu">of</a> <a href="//www.youtube.com/watch?v=U4FLL0TL6_4&feature=relmfu">the</a> <a href="//www.youtube.com/watch?v=A5wR9eEbHoY&feature=relmfu">videos</a>, and be on the lookout for ads in your favorite newspaper or website. We hope you’ll learn something new about how to protect yourself online—tips that are always good to know!<br /> <br /> <i><b>Update</b> Jan 17:</i> Updated to include more background about Good to Know.<br /> <br /> <span class="byline-author">Posted by Alma Whitten, Director of Privacy, Product and Engineering</span> <span itemprop='author' itemscope='itemscope' itemtype='http://schema.org/Person'> <meta content='https://plus.google.com/116899029375914044550' itemprop='url'/> </span> </script> <noscript> Does this person sound familiar? He can’t be bothered to type a password into his phone every time he wants to play a game of Angry Birds. When he does need a password, maybe for his email or bank website, he chooses one that’s easy to remember like his sister’s name—and he uses the same one for each website he visits. For him, cookies come from the bakery, IP addresses are the locations of Intellectual Property and a correct Google search result is basically magic.<br /> <br /> Most of us know someone like this. Technology can be confusing, and the industry often fails to explain clearly enough why digital literacy matters. So today in the U.S. we’re kicking off <a href="//google.com/goodtoknow">Good to Know</a>, our biggest-ever consumer education campaign focused on making the web a safer, more comfortable place. Our ad campaign, which we introduced in the U.K. and Germany last fall, offers privacy and security tips: Use <a href="//www.google.com/goodtoknow/online-safety/security-tools/">2-step verification</a>! Remember to lock your computer when you step away! Make sure your connection to a website is <a href="//www.google.com/goodtoknow/online-safety/secure-sites/">secure</a>! It also <a href="//www.google.com/goodtoknow/data-on-the-web/">explains</a> some of the building blocks of the web like cookies and IP addresses. Keep an eye out for the ads in newspapers and magazines, online and in New York and Washington, D.C. subway stations.<br /> <br /> <embed flashvars="host=picasaweb.google.com&hl=en_US&feat=flashalbum&RGB=0x000000&feed=https%3A%2F%2Fpicasaweb.google.com%2Fdata%2Ffeed%2Fapi%2Fuser%2F116887554964117158278%2Falbumid%2F5698403762820753729%3Falt%3Drss%26kind%3Dphoto%26authkey%3DGv1sRgCKWdqPvJqo2aHg%26hl%3Den_US" height="334" pluginspage="http://www.macromedia.com/go/getflashplayer" src="https://picasaweb.google.com/s/c/bin/slideshow.swf" type="application/x-shockwave-flash" width="500"></embed><br /> <br /> The campaign and <a href="//www.google.com/goodtoknow">Good to Know website</a> build on our commitment to keeping people safe online. We’ve created resources like <a href="//youtube.com/googleprivacy">privacy videos</a>, the <a href="//www.google.com/security/">Google Security Center</a>, the <a href="//www.google.com/familysafety/">Family Safety Center</a> and <a href="http://www.teachparentstech.org/">Teach Parents Tech</a> to help you develop strong privacy and security habits. We design for privacy, building tools like <a href="//google.com/dashboard">Google Dashboard</a>, <a href="http://googlepublicpolicy.blogspot.com/2011/06/me-myself-and-i-helping-to-manage-your.html">Me on the Web</a>, the <a href="//www.google.com/ads/preferences">Ads Preferences Manager</a> and <a href="//www.youtube.com/watch?v=BeMZP-oyOII">Google+ Circles</a>—with more on the way.<br /> <br /> We encourage you to take a few minutes to check out the <a href="//www.google.com/goodtoknow">Good to Know site</a>, watch <a href="//www.youtube.com/watch?v=qjxDrmAaZIs&feature=endscreen&NR=1">some</a> <a href="//www.youtube.com/watch?v=tz0FEnve_rs&feature=relmfu">of</a> <a href="//www.youtube.com/watch?v=U4FLL0TL6_4&feature=relmfu">the</a> <a href="//www.youtube.com/watch?v=A5wR9eEbHoY&feature=relmfu">videos</a>, and be on the lookout for ads in your favorite newspaper or website. We hope you’ll learn something new about how to protect yourself online—tips that are always good to know!<br /> <br /> <i><b>Update</b> Jan 17:</i> Updated to include more background about Good to Know.<br /> <br /> <span class="byline-author">Posted by Alma Whitten, Director of Privacy, Product and Engineering</span> <span itemprop='author' itemscope='itemscope' itemtype='http://schema.org/Person'> <meta content='https://plus.google.com/116899029375914044550' itemprop='url'/> </span> </noscript> </div> </div> <div class='share'> <span class='gplus-share social-wrapper' data-href='https://plus.google.com/share?url=https://googleblog.blogspot.com/2012/01/tech-tips-that-are-good-to-know.html'> <img alt='Share on Google+' height='24' src='https://www.gstatic.com/images/branding/google_plus/2x/ic_w_post_gplus_black_24dp.png' width='24'/> </span> <span class='twitter-custom social-wrapper' data-href='http://twitter.com/share?text=Official Google Blog:Tech tips that are Good to Know&url=https://googleblog.blogspot.com/2012/01/tech-tips-that-are-good-to-know.html&via=google'> <img alt='Share on Twitter' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_twitter_black_24dp.png' width='24'/> </span> <span class='fb-custom social-wrapper' data-href='https://www.facebook.com/sharer.php?u=https://googleblog.blogspot.com/2012/01/tech-tips-that-are-good-to-know.html'> <img alt='Share on Facebook' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_facebook_black_24dp.png' width='24'/> </span> </div> <div class='post-footer'> <div class='cmt_iframe_holder' data-href='https://googleblog.blogspot.com/2012/01/tech-tips-that-are-good-to-know.html' data-viewtype='FILTERED_POSTMOD'></div> <a href='https://plus.google.com/112374322230920073195' rel='author' style='display:none;'> Google </a> <div class='label-footer'> <span class='labels-caption'> Labels: </span> <span class='labels'> <a class='label' href='https://googleblog.blogspot.com/search/label/online%20safety' rel='tag'> online safety </a> , <a class='label' href='https://googleblog.blogspot.com/search/label/privacy' rel='tag'> privacy </a> , <a class='label' href='https://googleblog.blogspot.com/search/label/security' rel='tag'> security </a> </span> </div> </div> </div> <div class='post' data-id='3830519129461044992' itemscope='' itemtype='http://schema.org/BlogPosting'> <h2 class='title' itemprop='name'> <a href='https://googleblog.blogspot.com/2011/10/making-search-more-secure.html' itemprop='url' title='Making search more secure'> Making search more secure </a> </h2> <div class='post-header'> <div class='published'> <span class='publishdate' itemprop='datePublished'> October 18, 2011 </span> </div> </div> <div class='post-body'> <div class='post-content' itemprop='articleBody'> <script type='text/template'> We’ve worked hard over the past few years to increase our services’ use of an encryption protocol called SSL, as well as encouraging the industry to adopt stronger security standards. For example, we made <a href="http://gmailblog.blogspot.com/2010/01/default-https-access-for-gmail.html">SSL the default setting in Gmail</a> in January 2010 and <a href="http://googleblog.blogspot.com/2010/05/search-more-securely-with-encrypted.html">introduced</a> an encrypted search service located at <a href="https://encrypted.google.com/">https://encrypted.google.com</a> four months later. Other prominent web companies have <a href="https://support.twitter.com/articles/481955-how-to-enable-https">also</a> <a href="http://www.facebook.com/blog.php?post=486790652130">added</a> SSL support in recent months.<br /> <br /> As search becomes an increasingly customized experience, we recognize the growing importance of protecting the <a href="//www.google.com/support/accounts/bin/answer.py?answer=54041">personalized search results</a> we deliver. As a result, we’re enhancing our default search experience for signed-in users. Over the next few weeks, many of you will find yourselves redirected to <a href="https://www.google.com/">https://www.google.com</a> (note the extra “s”) when you’re signed in to your Google Account. This change <a href="//www.google.com/support/websearch/bin/answer.py?hl=en&answer=173733&topic=1678515">encrypts your search queries</a> and Google’s results page. This is especially important when you’re using an unsecured Internet connection, such as a WiFi hotspot in an Internet cafe. You can also navigate to <a href="https://www.google.com/">https://www.google.com</a> directly if you’re signed out or if you don’t have a Google Account.<br /> <br /> What does this mean for sites that receive clicks from Google search results? When you search from <a href="https://www.google.com/">https://www.google.com</a>, websites you visit from our organic search listings will still know that you came from Google, but won't receive information about each individual query. They can also receive an aggregated list of the top 1,000 search queries that drove traffic to their site for each of the past 30 days through <a href="//www.google.com/webmasters/">Google Webmaster Tools</a>. This information helps webmasters keep more accurate statistics about their user traffic. If you choose to click on an ad appearing on our search results page, your browser will continue to send the relevant query over the network to enable advertisers to measure the effectiveness of their campaigns and to improve the ads and offers they present to you.<br /> <br /> As we continue to add more support for SSL across our products and services, we hope to see similar action from other websites. That’s why our researchers <a href="http://www.imperialviolet.org/2010/06/25/overclocking-ssl.html">publish information</a> about SSL and provide advice to help facilitate broader use of the protocol. We hope that today’s move to increase the privacy and security of your web searches is only the next step in a broader <a href="https://www.eff.org/https-everywhere">industry effort</a> to employ SSL encryption more widely and effectively.<br /> <br /> <span class="byline-author">Posted by Evelyn Kao, Product Manager</span> <span itemprop='author' itemscope='itemscope' itemtype='http://schema.org/Person'> <meta content='https://plus.google.com/116899029375914044550' itemprop='url'/> </span> </script> <noscript> We’ve worked hard over the past few years to increase our services’ use of an encryption protocol called SSL, as well as encouraging the industry to adopt stronger security standards. For example, we made <a href="http://gmailblog.blogspot.com/2010/01/default-https-access-for-gmail.html">SSL the default setting in Gmail</a> in January 2010 and <a href="http://googleblog.blogspot.com/2010/05/search-more-securely-with-encrypted.html">introduced</a> an encrypted search service located at <a href="https://encrypted.google.com/">https://encrypted.google.com</a> four months later. Other prominent web companies have <a href="https://support.twitter.com/articles/481955-how-to-enable-https">also</a> <a href="http://www.facebook.com/blog.php?post=486790652130">added</a> SSL support in recent months.<br /> <br /> As search becomes an increasingly customized experience, we recognize the growing importance of protecting the <a href="//www.google.com/support/accounts/bin/answer.py?answer=54041">personalized search results</a> we deliver. As a result, we’re enhancing our default search experience for signed-in users. Over the next few weeks, many of you will find yourselves redirected to <a href="https://www.google.com/">https://www.google.com</a> (note the extra “s”) when you’re signed in to your Google Account. This change <a href="//www.google.com/support/websearch/bin/answer.py?hl=en&answer=173733&topic=1678515">encrypts your search queries</a> and Google’s results page. This is especially important when you’re using an unsecured Internet connection, such as a WiFi hotspot in an Internet cafe. You can also navigate to <a href="https://www.google.com/">https://www.google.com</a> directly if you’re signed out or if you don’t have a Google Account.<br /> <br /> What does this mean for sites that receive clicks from Google search results? When you search from <a href="https://www.google.com/">https://www.google.com</a>, websites you visit from our organic search listings will still know that you came from Google, but won't receive information about each individual query. They can also receive an aggregated list of the top 1,000 search queries that drove traffic to their site for each of the past 30 days through <a href="//www.google.com/webmasters/">Google Webmaster Tools</a>. This information helps webmasters keep more accurate statistics about their user traffic. If you choose to click on an ad appearing on our search results page, your browser will continue to send the relevant query over the network to enable advertisers to measure the effectiveness of their campaigns and to improve the ads and offers they present to you.<br /> <br /> As we continue to add more support for SSL across our products and services, we hope to see similar action from other websites. That’s why our researchers <a href="http://www.imperialviolet.org/2010/06/25/overclocking-ssl.html">publish information</a> about SSL and provide advice to help facilitate broader use of the protocol. We hope that today’s move to increase the privacy and security of your web searches is only the next step in a broader <a href="https://www.eff.org/https-everywhere">industry effort</a> to employ SSL encryption more widely and effectively.<br /> <br /> <span class="byline-author">Posted by Evelyn Kao, Product Manager</span> <span itemprop='author' itemscope='itemscope' itemtype='http://schema.org/Person'> <meta content='https://plus.google.com/116899029375914044550' itemprop='url'/> </span> </noscript> </div> </div> <div class='share'> <span class='gplus-share social-wrapper' data-href='https://plus.google.com/share?url=https://googleblog.blogspot.com/2011/10/making-search-more-secure.html'> <img alt='Share on Google+' height='24' src='https://www.gstatic.com/images/branding/google_plus/2x/ic_w_post_gplus_black_24dp.png' width='24'/> </span> <span class='twitter-custom social-wrapper' data-href='http://twitter.com/share?text=Official Google Blog:Making search more secure&url=https://googleblog.blogspot.com/2011/10/making-search-more-secure.html&via=google'> <img alt='Share on Twitter' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_twitter_black_24dp.png' width='24'/> </span> <span class='fb-custom social-wrapper' data-href='https://www.facebook.com/sharer.php?u=https://googleblog.blogspot.com/2011/10/making-search-more-secure.html'> <img alt='Share on Facebook' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_facebook_black_24dp.png' width='24'/> </span> </div> <div class='post-footer'> <div class='cmt_iframe_holder' data-href='https://googleblog.blogspot.com/2011/10/making-search-more-secure.html' data-viewtype='FILTERED_POSTMOD'></div> <a href='https://plus.google.com/112374322230920073195' rel='author' style='display:none;'> Google </a> <div class='label-footer'> <span class='labels-caption'> Labels: </span> <span class='labels'> <a class='label' href='https://googleblog.blogspot.com/search/label/search' rel='tag'> search </a> , <a class='label' href='https://googleblog.blogspot.com/search/label/security' rel='tag'> security </a> </span> </div> </div> </div> <div class='post' data-id='6909424441049643890' itemscope='' itemtype='http://schema.org/BlogPosting'> <h2 class='title' itemprop='name'> <a href='https://googleblog.blogspot.com/2011/10/national-cyber-security-awareness-month.html' itemprop='url' title='National Cyber Security Awareness Month 2011: Our Shared Responsibility'> National Cyber Security Awareness Month 2011: Our Shared Responsibility </a> </h2> <div class='post-header'> <div class='published'> <span class='publishdate' itemprop='datePublished'> October 7, 2011 </span> </div> </div> <div class='post-body'> <div class='post-content' itemprop='articleBody'> <script type='text/template'> <i>(Cross-posted on the <a href="http://googlepublicpolicy.blogspot.com/2011/10/national-cyber-security-awareness-month.html">Public Policy Blog</a>)</i><br /> <br /> On the Internet, as with the offline world, the choices we make often have an impact on others. The links we share and the sites we visit can affect our security and sometimes introduce risk for people we know. Given how quickly our collective use of technology is evolving, it’s useful to periodically remind ourselves of practices that can help us achieve a more secure and enjoyable online experience.<br /> <br /> This month, Google once again joins the <a href="http://www.staysafeonline.org/">National Cyber Security Alliance (NCSA)</a>, government agencies, corporations, schools and non-profit organizations in recognizing <a href="http://www.staysafeonline.org/ncsam">National Cyber Security Awareness Month</a>. It’s a time for us to offer education that increases online security for everyone.<br /> <br /> It’s fitting that the theme of this year’s Cyber Security Awareness Month is “Our Shared Responsibility.” With ever-increasing ways to access the web and share information, we need to focus on keeping our activities secure. In that spirit, and to help kick off Cyber Security Awareness Month, we’re introducing a new <a href="//www.google.com/security">Google Security Center</a>. The Security Center is full of practical tips and information to help people stay safe online, from choosing a secure password to using 2-step verification and avoiding phishing sites and malware.<br /> <br /> We also continue to develop products and services that help people protect their information online. Examples that have stood out so far this year include the <a href="//www.google.com/chromebook/">Chromebook</a>, <a href="http://googleblog.blogspot.com/2011/07/2-step-verification-stay-safe-around.html">2-step verification in 40 languages</a>, and Chrome browser warnings for <a href="http://googleonlinesecurity.blogspot.com/2011/04/protecting-users-from-malicious.html">malicious downloads</a> and <a href="http://secbrowsing.blogspot.com/2011/03/out-of-date-plug-in-warnings-now-part.html">out-of-date plugins</a>, among others. We develop free products and tools such as <a href="http://googleonlinesecurity.blogspot.com/2011/06/introducing-dom-snitch-our-passive-in.html">DOM Snitch</a>, a Chrome extension that helps developers identify insecure code. <br /> <br /> We recognize the importance of security education and are committed to helping make your online experience both exciting and safe to use. We all have a responsibility to take steps to protect ourselves and together develop a culture of security. We encourage everyone to <a href="http://stopthinkconnect.org/">Stop. Think. Connect.</a><br /> <br /> <div class="separator" style="clear: both; text-align: center;"> <a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh07AkrMsRpHXL3dnMWLhcOdv_KAJUByDIWP1kkwuUzE0lemyh92uk_MzeBCJPLCJL774bJtV4m5KY25am1jaezSma-Aap86iAcrcUZj29SIR3RhyWSDgtZIR6ryTRrrw-JMrkn/s1600/stop+think+connect.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh07AkrMsRpHXL3dnMWLhcOdv_KAJUByDIWP1kkwuUzE0lemyh92uk_MzeBCJPLCJL774bJtV4m5KY25am1jaezSma-Aap86iAcrcUZj29SIR3RhyWSDgtZIR6ryTRrrw-JMrkn/s1600/stop+think+connect.png" /></a></div> <br /> <span class="byline-author">Posted by Eric Davis, Public Policy Manager, Security</span> <span itemprop='author' itemscope='itemscope' itemtype='http://schema.org/Person'> <meta content='https://plus.google.com/116899029375914044550' itemprop='url'/> </span> </script> <noscript> <i>(Cross-posted on the <a href="http://googlepublicpolicy.blogspot.com/2011/10/national-cyber-security-awareness-month.html">Public Policy Blog</a>)</i><br /> <br /> On the Internet, as with the offline world, the choices we make often have an impact on others. The links we share and the sites we visit can affect our security and sometimes introduce risk for people we know. Given how quickly our collective use of technology is evolving, it’s useful to periodically remind ourselves of practices that can help us achieve a more secure and enjoyable online experience.<br /> <br /> This month, Google once again joins the <a href="http://www.staysafeonline.org/">National Cyber Security Alliance (NCSA)</a>, government agencies, corporations, schools and non-profit organizations in recognizing <a href="http://www.staysafeonline.org/ncsam">National Cyber Security Awareness Month</a>. It’s a time for us to offer education that increases online security for everyone.<br /> <br /> It’s fitting that the theme of this year’s Cyber Security Awareness Month is “Our Shared Responsibility.” With ever-increasing ways to access the web and share information, we need to focus on keeping our activities secure. In that spirit, and to help kick off Cyber Security Awareness Month, we’re introducing a new <a href="//www.google.com/security">Google Security Center</a>. The Security Center is full of practical tips and information to help people stay safe online, from choosing a secure password to using 2-step verification and avoiding phishing sites and malware.<br /> <br /> We also continue to develop products and services that help people protect their information online. Examples that have stood out so far this year include the <a href="//www.google.com/chromebook/">Chromebook</a>, <a href="http://googleblog.blogspot.com/2011/07/2-step-verification-stay-safe-around.html">2-step verification in 40 languages</a>, and Chrome browser warnings for <a href="http://googleonlinesecurity.blogspot.com/2011/04/protecting-users-from-malicious.html">malicious downloads</a> and <a href="http://secbrowsing.blogspot.com/2011/03/out-of-date-plug-in-warnings-now-part.html">out-of-date plugins</a>, among others. We develop free products and tools such as <a href="http://googleonlinesecurity.blogspot.com/2011/06/introducing-dom-snitch-our-passive-in.html">DOM Snitch</a>, a Chrome extension that helps developers identify insecure code. <br /> <br /> We recognize the importance of security education and are committed to helping make your online experience both exciting and safe to use. We all have a responsibility to take steps to protect ourselves and together develop a culture of security. We encourage everyone to <a href="http://stopthinkconnect.org/">Stop. Think. Connect.</a><br /> <br /> <div class="separator" style="clear: both; text-align: center;"> <a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh07AkrMsRpHXL3dnMWLhcOdv_KAJUByDIWP1kkwuUzE0lemyh92uk_MzeBCJPLCJL774bJtV4m5KY25am1jaezSma-Aap86iAcrcUZj29SIR3RhyWSDgtZIR6ryTRrrw-JMrkn/s1600/stop+think+connect.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh07AkrMsRpHXL3dnMWLhcOdv_KAJUByDIWP1kkwuUzE0lemyh92uk_MzeBCJPLCJL774bJtV4m5KY25am1jaezSma-Aap86iAcrcUZj29SIR3RhyWSDgtZIR6ryTRrrw-JMrkn/s1600/stop+think+connect.png" /></a></div> <br /> <span class="byline-author">Posted by Eric Davis, Public Policy Manager, Security</span> <span itemprop='author' itemscope='itemscope' itemtype='http://schema.org/Person'> <meta content='https://plus.google.com/116899029375914044550' itemprop='url'/> </span> </noscript> </div> </div> <div class='share'> <span class='gplus-share social-wrapper' data-href='https://plus.google.com/share?url=https://googleblog.blogspot.com/2011/10/national-cyber-security-awareness-month.html'> <img alt='Share on Google+' height='24' src='https://www.gstatic.com/images/branding/google_plus/2x/ic_w_post_gplus_black_24dp.png' width='24'/> </span> <span class='twitter-custom social-wrapper' data-href='http://twitter.com/share?text=Official Google Blog:National Cyber Security Awareness Month 2011: Our Shared Responsibility&url=https://googleblog.blogspot.com/2011/10/national-cyber-security-awareness-month.html&via=google'> <img alt='Share on Twitter' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_twitter_black_24dp.png' width='24'/> </span> <span class='fb-custom social-wrapper' data-href='https://www.facebook.com/sharer.php?u=https://googleblog.blogspot.com/2011/10/national-cyber-security-awareness-month.html'> <img alt='Share on Facebook' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_facebook_black_24dp.png' width='24'/> </span> </div> <div class='post-footer'> <div class='cmt_iframe_holder' data-href='https://googleblog.blogspot.com/2011/10/national-cyber-security-awareness-month.html' data-viewtype='FILTERED_POSTMOD'></div> <a href='https://plus.google.com/112374322230920073195' rel='author' style='display:none;'> Google </a> <div class='label-footer'> <span class='labels-caption'> Labels: </span> <span class='labels'> <a class='label' href='https://googleblog.blogspot.com/search/label/security' rel='tag'> security </a> </span> </div> </div> </div> <div class='post' data-id='1687972042248784972' itemscope='' itemtype='http://schema.org/BlogPosting'> <h2 class='title' itemprop='name'> <a href='https://googleblog.blogspot.com/2011/07/2-step-verification-stay-safe-around.html' itemprop='url' title='2-step verification: stay safe around the world in 40 languages'> 2-step verification: stay safe around the world in 40 languages </a> </h2> <div class='post-header'> <div class='published'> <span class='publishdate' itemprop='datePublished'> July 28, 2011 </span> </div> </div> <div class='post-body'> <div class='post-content' itemprop='articleBody'> <script type='text/template'> <i>(Cross-posted on the <a href="http://googleonlinesecurity.blogspot.com/2011/07/2-step-verification-stay-safe-around.html">Online Security Blog</a>)</i><br /> <br /> Earlier this year, we <a href="http://googleblog.blogspot.com/2011/02/advanced-sign-in-security-for-your.html">introduced</a> a security feature called <i>2-step verification</i> that helps protect your Google Account from threats like password compromise and identity theft. By entering a one-time verification code from your phone after you type your password, you can make it much tougher for an unauthorized person to gain access to your account.<br /> <br /> People have told us how much they like the feature, which is why we're thrilled to offer 2-step verification in 40 languages and in more than 150 countries. There’s never been a better time to set it up: Examples in the news of password theft and data breaches constantly remind us to stay on our toes and take advantage of tools to properly secure our valuable online information. Email, social networking and other online accounts still get compromised today, but 2-step verification cuts those risks significantly.<br /> <br /> We recommend investing some time in keeping your information safe by watching our <a href="//www.google.com/support/accounts/bin/static.py?page=guide.cs&guide=1056283&topic=1056284">2-step verification video</a> to learn how to quickly increase your Google Account’s resistance to common problems like reused passwords and <a href="//www.google.com/support/chrome/bin/answer.py?answer=99020">malware and phishing scams</a>. Wherever you are in the world, <a href="//www.google.com/support/accounts/bin/static.py?page=guide.cs&guide=1056283&topic=1056284">sign up for 2-step verification</a> and help keep yourself one step ahead of the bad guys.<br /> <br /> To learn more about online safety tips and resources, visit our ongoing security <a href="http://googleblog.blogspot.com/search/label/security">blog series</a>, and review a couple of simple <a href="//www.google.com/help/security/">tips and tricks</a> for online security. Also, watch our video about <a href="//www.youtube.com/watch?hl=en&v=nOgsXdB67Pc">five easy ways</a> to help you stay safe and secure as you browse.<br /> <br /> <i><b>Update</b> on 12/1/11</i>: We recently made 2-step verification available for users in even more places, including Iran, Japan, Liberia, Myanmar (Burma), Sudan and Syria. This enhanced security feature for Google Accounts is now available in more than 175 countries.<br /> <br /> <span class="byline-author">Posted by Nishit Shah, Product Manager, Google Security</span> <span itemprop='author' itemscope='itemscope' itemtype='http://schema.org/Person'> <meta content='https://plus.google.com/116899029375914044550' itemprop='url'/> </span> </script> <noscript> <i>(Cross-posted on the <a href="http://googleonlinesecurity.blogspot.com/2011/07/2-step-verification-stay-safe-around.html">Online Security Blog</a>)</i><br /> <br /> Earlier this year, we <a href="http://googleblog.blogspot.com/2011/02/advanced-sign-in-security-for-your.html">introduced</a> a security feature called <i>2-step verification</i> that helps protect your Google Account from threats like password compromise and identity theft. By entering a one-time verification code from your phone after you type your password, you can make it much tougher for an unauthorized person to gain access to your account.<br /> <br /> People have told us how much they like the feature, which is why we're thrilled to offer 2-step verification in 40 languages and in more than 150 countries. There’s never been a better time to set it up: Examples in the news of password theft and data breaches constantly remind us to stay on our toes and take advantage of tools to properly secure our valuable online information. Email, social networking and other online accounts still get compromised today, but 2-step verification cuts those risks significantly.<br /> <br /> We recommend investing some time in keeping your information safe by watching our <a href="//www.google.com/support/accounts/bin/static.py?page=guide.cs&guide=1056283&topic=1056284">2-step verification video</a> to learn how to quickly increase your Google Account’s resistance to common problems like reused passwords and <a href="//www.google.com/support/chrome/bin/answer.py?answer=99020">malware and phishing scams</a>. Wherever you are in the world, <a href="//www.google.com/support/accounts/bin/static.py?page=guide.cs&guide=1056283&topic=1056284">sign up for 2-step verification</a> and help keep yourself one step ahead of the bad guys.<br /> <br /> To learn more about online safety tips and resources, visit our ongoing security <a href="http://googleblog.blogspot.com/search/label/security">blog series</a>, and review a couple of simple <a href="//www.google.com/help/security/">tips and tricks</a> for online security. Also, watch our video about <a href="//www.youtube.com/watch?hl=en&v=nOgsXdB67Pc">five easy ways</a> to help you stay safe and secure as you browse.<br /> <br /> <i><b>Update</b> on 12/1/11</i>: We recently made 2-step verification available for users in even more places, including Iran, Japan, Liberia, Myanmar (Burma), Sudan and Syria. This enhanced security feature for Google Accounts is now available in more than 175 countries.<br /> <br /> <span class="byline-author">Posted by Nishit Shah, Product Manager, Google Security</span> <span itemprop='author' itemscope='itemscope' itemtype='http://schema.org/Person'> <meta content='https://plus.google.com/116899029375914044550' itemprop='url'/> </span> </noscript> </div> </div> <div class='share'> <span class='gplus-share social-wrapper' data-href='https://plus.google.com/share?url=https://googleblog.blogspot.com/2011/07/2-step-verification-stay-safe-around.html'> <img alt='Share on Google+' height='24' src='https://www.gstatic.com/images/branding/google_plus/2x/ic_w_post_gplus_black_24dp.png' width='24'/> </span> <span class='twitter-custom social-wrapper' data-href='http://twitter.com/share?text=Official Google Blog:2-step verification: stay safe around the world in 40 languages&url=https://googleblog.blogspot.com/2011/07/2-step-verification-stay-safe-around.html&via=google'> <img alt='Share on Twitter' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_twitter_black_24dp.png' width='24'/> </span> <span class='fb-custom social-wrapper' data-href='https://www.facebook.com/sharer.php?u=https://googleblog.blogspot.com/2011/07/2-step-verification-stay-safe-around.html'> <img alt='Share on Facebook' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_facebook_black_24dp.png' width='24'/> </span> </div> <div class='post-footer'> <div class='cmt_iframe_holder' data-href='https://googleblog.blogspot.com/2011/07/2-step-verification-stay-safe-around.html' data-viewtype='FILTERED_POSTMOD'></div> <a href='https://plus.google.com/112374322230920073195' rel='author' style='display:none;'> Google </a> <div class='label-footer'> <span class='labels-caption'> Labels: </span> <span class='labels'> <a class='label' href='https://googleblog.blogspot.com/search/label/security' rel='tag'> security </a> </span> </div> </div> </div> <div class='post' data-id='7954600331491328153' itemscope='' itemtype='http://schema.org/BlogPosting'> <h2 class='title' itemprop='name'> <a href='https://googleblog.blogspot.com/2011/07/using-data-to-protect-people-from.html' itemprop='url' title='Using data to protect people from malware'> Using data to protect people from malware </a> </h2> <div class='post-header'> <div class='published'> <span class='publishdate' itemprop='datePublished'> July 19, 2011 </span> </div> </div> <div class='post-body'> <div class='post-content' itemprop='articleBody'> <script type='text/template'> <i>(Cross-posted on the <a href="http://googleonlinesecurity.blogspot.com/2011/07/using-data-to-protect-people-from.html">Google Online Security Blog</a>)</i><br /> <br /> The Internet brings remarkable benefits to society. Unfortunately, some people use it for harm and their own gain at the expense of others. We believe in the power of the web and information, and we work every day to detect potential abuse of our services and ward off attacks.<br /> <br /> As we work to protect our users and their information, we sometimes discover unusual patterns of activity. Recently, we found some unusual search traffic while performing routine maintenance on one of our data centers. After collaborating with security engineers at several companies that were sending this modified traffic, we determined that the computers exhibiting this behavior were infected with a particular strain of malicious software, or “malware.” As a result of this discovery, today some people will see a prominent notification at the top of their Google web search results:<br /> <br /> <div style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhtBtzwjyYfbjs1dIPsA0iiWPwRz5hhmcn98QV_H5JRCTGXhxmYioTqBHnk85d0d64T6Efr6s-_yKy9IVKCW7M2eLIBrbilAQvzRKS2IBYU8OlYSs4MpMhMQ_wKVKulpNVnBVLf/s1600/MalwareWarningScreenshot.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhtBtzwjyYfbjs1dIPsA0iiWPwRz5hhmcn98QV_H5JRCTGXhxmYioTqBHnk85d0d64T6Efr6s-_yKy9IVKCW7M2eLIBrbilAQvzRKS2IBYU8OlYSs4MpMhMQ_wKVKulpNVnBVLf/" width="500" /></a></div><br /> This particular malware causes infected computers to send traffic to Google through a small number of intermediary servers called “proxies.” We hope that by taking steps to notify users whose traffic is coming through these proxies, we can help them update their antivirus software and remove the infections.<br /> <br /> We hope to use the knowledge we’ve gathered to assist as many people as possible. In case our notice doesn’t reach everyone directly, you can run a system scan on your computer yourself by following the steps in our <a href="//www.google.com/support/websearch/bin/answer.py?answer=1182191">Help Center article</a>.<br /> <br /> <i><b>Update</b> July 20, 2011:</i> We've seen a few common questions we thought we'd address here: <br /> <ul><li>The malware appears to have gotten onto users' computers from one of roughly a hundred variants of fake antivirus, or "fake AV" software that has been in circulation for a while. We aren't aware of a common name for the malware.</li> <li>We believe a couple million machines are affected by this malware.</li> <li>We've heard from a number of you that you're thinking about the potential for an attacker to copy our notice and attempt to point users to a dangerous site instead. It's a good security practice to be cautious about the links you click, so the spirit of those comments is spot-on. We thought about this, too, which is why the notice appears only at the top of our search results page. Falsifying the message on this page would require prior compromise of that computer, so the notice is not a risk to additional users.</li> <li>In the meantime, we've been able to successfully warn hundreds of thousands of users that their computer is infected. These are people who otherwise may never have known.</li> </ul><span class="byline-author">Posted by Damian Menscher, Security Engineer</span> <span itemprop='author' itemscope='itemscope' itemtype='http://schema.org/Person'> <meta content='https://plus.google.com/116899029375914044550' itemprop='url'/> </span> </script> <noscript> <i>(Cross-posted on the <a href="http://googleonlinesecurity.blogspot.com/2011/07/using-data-to-protect-people-from.html">Google Online Security Blog</a>)</i><br /> <br /> The Internet brings remarkable benefits to society. Unfortunately, some people use it for harm and their own gain at the expense of others. We believe in the power of the web and information, and we work every day to detect potential abuse of our services and ward off attacks.<br /> <br /> As we work to protect our users and their information, we sometimes discover unusual patterns of activity. Recently, we found some unusual search traffic while performing routine maintenance on one of our data centers. After collaborating with security engineers at several companies that were sending this modified traffic, we determined that the computers exhibiting this behavior were infected with a particular strain of malicious software, or “malware.” As a result of this discovery, today some people will see a prominent notification at the top of their Google web search results:<br /> <br /> <div style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhtBtzwjyYfbjs1dIPsA0iiWPwRz5hhmcn98QV_H5JRCTGXhxmYioTqBHnk85d0d64T6Efr6s-_yKy9IVKCW7M2eLIBrbilAQvzRKS2IBYU8OlYSs4MpMhMQ_wKVKulpNVnBVLf/s1600/MalwareWarningScreenshot.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhtBtzwjyYfbjs1dIPsA0iiWPwRz5hhmcn98QV_H5JRCTGXhxmYioTqBHnk85d0d64T6Efr6s-_yKy9IVKCW7M2eLIBrbilAQvzRKS2IBYU8OlYSs4MpMhMQ_wKVKulpNVnBVLf/" width="500" /></a></div><br /> This particular malware causes infected computers to send traffic to Google through a small number of intermediary servers called “proxies.” We hope that by taking steps to notify users whose traffic is coming through these proxies, we can help them update their antivirus software and remove the infections.<br /> <br /> We hope to use the knowledge we’ve gathered to assist as many people as possible. In case our notice doesn’t reach everyone directly, you can run a system scan on your computer yourself by following the steps in our <a href="//www.google.com/support/websearch/bin/answer.py?answer=1182191">Help Center article</a>.<br /> <br /> <i><b>Update</b> July 20, 2011:</i> We've seen a few common questions we thought we'd address here: <br /> <ul><li>The malware appears to have gotten onto users' computers from one of roughly a hundred variants of fake antivirus, or "fake AV" software that has been in circulation for a while. We aren't aware of a common name for the malware.</li> <li>We believe a couple million machines are affected by this malware.</li> <li>We've heard from a number of you that you're thinking about the potential for an attacker to copy our notice and attempt to point users to a dangerous site instead. It's a good security practice to be cautious about the links you click, so the spirit of those comments is spot-on. We thought about this, too, which is why the notice appears only at the top of our search results page. Falsifying the message on this page would require prior compromise of that computer, so the notice is not a risk to additional users.</li> <li>In the meantime, we've been able to successfully warn hundreds of thousands of users that their computer is infected. These are people who otherwise may never have known.</li> </ul><span class="byline-author">Posted by Damian Menscher, Security Engineer</span> <span itemprop='author' itemscope='itemscope' itemtype='http://schema.org/Person'> <meta content='https://plus.google.com/116899029375914044550' itemprop='url'/> </span> </noscript> </div> </div> <div class='share'> <span class='gplus-share social-wrapper' data-href='https://plus.google.com/share?url=https://googleblog.blogspot.com/2011/07/using-data-to-protect-people-from.html'> <img alt='Share on Google+' height='24' src='https://www.gstatic.com/images/branding/google_plus/2x/ic_w_post_gplus_black_24dp.png' width='24'/> </span> <span class='twitter-custom social-wrapper' data-href='http://twitter.com/share?text=Official Google Blog:Using data to protect people from malware&url=https://googleblog.blogspot.com/2011/07/using-data-to-protect-people-from.html&via=google'> <img alt='Share on Twitter' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_twitter_black_24dp.png' width='24'/> </span> <span class='fb-custom social-wrapper' data-href='https://www.facebook.com/sharer.php?u=https://googleblog.blogspot.com/2011/07/using-data-to-protect-people-from.html'> <img alt='Share on Facebook' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_facebook_black_24dp.png' width='24'/> </span> </div> <div class='post-footer'> <div class='cmt_iframe_holder' data-href='https://googleblog.blogspot.com/2011/07/using-data-to-protect-people-from.html' data-viewtype='FILTERED_POSTMOD'></div> <a href='https://plus.google.com/112374322230920073195' rel='author' style='display:none;'> Google </a> <div class='label-footer'> <span class='labels-caption'> Labels: </span> <span class='labels'> <a class='label' href='https://googleblog.blogspot.com/search/label/security' rel='tag'> security </a> </span> </div> </div> </div> <div class='post' data-id='7007830225270011027' itemscope='' itemtype='http://schema.org/BlogPosting'> <h2 class='title' itemprop='name'> <a href='https://googleblog.blogspot.com/2011/06/ensuring-your-information-is-safe.html' itemprop='url' title='Ensuring your information is safe online'> Ensuring your information is safe online </a> </h2> <div class='post-header'> <div class='published'> <span class='publishdate' itemprop='datePublished'> June 1, 2011 </span> </div> </div> <div class='post-body'> <div class='post-content' itemprop='articleBody'> <script type='text/template'> The Internet has been an amazing force for good in the world—opening up communications, boosting economic growth and promoting free expression. But like all technologies, it can also be used for bad things. Today, despite the efforts of Internet companies and the security community, identity theft, fraud and the hijacking of people’s email accounts are common problems online.<br /> <br /> Bad actors take advantage of the fact that most people aren’t that tech savvy—hijacking accounts by using <a href="//www.google.com/support/chrome/bin/answer.py?answer=99020">malware and phishing scams</a> that trick users into sharing their passwords, or by using passwords obtained by hacking other websites. Most account hijackings are not very targeted; they are designed to steal identities, acquire financial data or send spam. But some attacks are targeted at specific individuals.<br /> <br /> Through the strength of our cloud-based security and abuse detection systems*, we recently uncovered a campaign to collect user passwords, likely through phishing. This campaign, which appears to originate from Jinan, China, affected what seem to be the personal Gmail accounts of hundreds of users including, among others, senior U.S. government officials, Chinese political activists, officials in several Asian countries (predominantly South Korea), military personnel and journalists.<br /> <br /> The goal of this effort seems to have been to monitor the contents of these users’ emails, with the perpetrators apparently using stolen passwords to change peoples’ forwarding and delegation settings. (Gmail enables you to forward your emails automatically, as well as grant others access to your account.)<br /> <br /> Google detected and has disrupted this campaign to take users’ passwords and monitor their emails. We have notified victims and secured their accounts. In addition, we have notified relevant government authorities.<br /> <br /> It’s important to stress that our internal systems have not been affected—these account hijackings were not the result of a security problem with Gmail itself. But we believe that being open about these security issues helps users better protect their information online.<br /> <br /> Here are some ways to improve your security when using Google products:<br /> <ul><li style="text-align: left;">Enable <a href="//www.google.com/support/accounts/bin/static.py?page=guide.cs&guide=1056283&topic=1056284">2-step verification</a>. This Gmail feature uses a phone and second password on sign-in, and it protected some accounts from this attack. So check out <a href="//www.youtube.com/watch?v=zMabEyrtPRg">this video</a> on setting up 2-step verification.</li> </ul><div style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjHn27RrVGDnjwdaVUVg1to31_6KFsT1-Z7Q25CqZxHPN2RSIARMf_RdVqxHD4JDccSXE8RYz8EwJk0hc0TXa94SmIVlFtj7HmqbeFv2N7VoM_sSJM5tvOfmoF3rgyluAKJhydb/s1600/2-step+promptB.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjHn27RrVGDnjwdaVUVg1to31_6KFsT1-Z7Q25CqZxHPN2RSIARMf_RdVqxHD4JDccSXE8RYz8EwJk0hc0TXa94SmIVlFtj7HmqbeFv2N7VoM_sSJM5tvOfmoF3rgyluAKJhydb/+promptB.png" width="500" /></a></div><ul><li>Use a <a href="//www.google.com/support/accounts/bin/answer.py?&answer=32040">strong password</a> for Google that you do not use on any other site. Here’s a <a href="//www.youtube.com/watch?v=0RCsHJfHL_4">video</a> to help.</li> <li>Enter your password only into a proper sign-in prompt on a <a href="https://www.google.com/">https://www.google.com</a> domain. We will <a href="http://mail.google.com/support/bin/answer.py?hl=en&answer=8253">never ask you to email your password</a> or enter it into a form that appears within an email message. Here’s a <a href="//www.youtube.com/watch?v=3vcLyvoKYZc">video</a> with more advice.</li> <li>Check your Gmail settings for suspicious <a href="http://mail.google.com/support/bin/answer.py?answer=10957">forwarding addresses</a> (“Forwarding and POP/IMAP” tab, Fig. 1) or <a href="http://mail.google.com/support/bin/answer.py?hl=en&ctx=mail&answer=138350">delegated accounts</a> (“Accounts” tab, Fig. 2).</li> </ul><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg0aJI1JKRVIBhgEoUd-Y-jcNnWqdTLl40-joStf5NipeBL7Ko3pYgjs7nLW_T03-jhpxSMqtt2q2OxD1e6eludQ9npeRXAaRw3C5ybjDuLfVdgMiIhbjiZN8MhVVY176ygZx0_/s1600/Picture+4.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="57" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg0aJI1JKRVIBhgEoUd-Y-jcNnWqdTLl40-joStf5NipeBL7Ko3pYgjs7nLW_T03-jhpxSMqtt2q2OxD1e6eludQ9npeRXAaRw3C5ybjDuLfVdgMiIhbjiZN8MhVVY176ygZx0_/s400/Picture+4.png" width="400" /></a></div><div style="text-align: center;"><i>Fig. 1</i></div><br /> <div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgSSNj_9QfW-np2CWJggVdNpNBbT3tlD7Ai0Px1Iu6g9HwdC_7lYEXJdQxea0dX5JJ4HsYrLr11XCoCO9Qbuee6lTPdVk_OZRjK3Gga9WwM2tJkFznGDvrvbGsNJTWj3JIQ0nVM/s1600/Picture+3.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="88" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgSSNj_9QfW-np2CWJggVdNpNBbT3tlD7Ai0Px1Iu6g9HwdC_7lYEXJdQxea0dX5JJ4HsYrLr11XCoCO9Qbuee6lTPdVk_OZRjK3Gga9WwM2tJkFznGDvrvbGsNJTWj3JIQ0nVM/s400/Picture+3.png" width="400" /></a></div><div style="text-align: center;"> <i>Fig. 2</i></div><ul><li>Watch for the red warnings about <a href="http://gmailblog.blogspot.com/2010/03/detecting-suspicious-account-activity.html">suspicious account activity</a> that may appear on top of your Gmail inbox.</li> <li>Review the security features offered by the <a href="//www.google.com/chrome/intl/en/more/security.html">Chrome browser</a>. If you don’t already use Chrome, consider switching your browser to Chrome.</li> <li>Explore other <a href="//www.google.com/help/security/">security recommendations</a> and a <a href="//www.youtube.com/watch?v=nOgsXdB67Pc">video with tips</a> on how to stay safe across the web.</li> </ul>Please spend ten minutes today taking steps to improve your online security so that you can experience all that the Internet offers—while also protecting your data.<br /> <br /> *We also relied on user reports and this <a href="http://contagiodump.blogspot.com/2011/02/targeted-attacks-against-personal.html">external report</a> to uncover the campaign described.<br /> <br /> <span class="byline-author">Posted by Eric Grosse, Engineering Director, Google Security Team</span> <span itemprop='author' itemscope='itemscope' itemtype='http://schema.org/Person'> <meta content='https://plus.google.com/116899029375914044550' itemprop='url'/> </span> </script> <noscript> The Internet has been an amazing force for good in the world—opening up communications, boosting economic growth and promoting free expression. But like all technologies, it can also be used for bad things. Today, despite the efforts of Internet companies and the security community, identity theft, fraud and the hijacking of people’s email accounts are common problems online.<br /> <br /> Bad actors take advantage of the fact that most people aren’t that tech savvy—hijacking accounts by using <a href="//www.google.com/support/chrome/bin/answer.py?answer=99020">malware and phishing scams</a> that trick users into sharing their passwords, or by using passwords obtained by hacking other websites. Most account hijackings are not very targeted; they are designed to steal identities, acquire financial data or send spam. But some attacks are targeted at specific individuals.<br /> <br /> Through the strength of our cloud-based security and abuse detection systems*, we recently uncovered a campaign to collect user passwords, likely through phishing. This campaign, which appears to originate from Jinan, China, affected what seem to be the personal Gmail accounts of hundreds of users including, among others, senior U.S. government officials, Chinese political activists, officials in several Asian countries (predominantly South Korea), military personnel and journalists.<br /> <br /> The goal of this effort seems to have been to monitor the contents of these users’ emails, with the perpetrators apparently using stolen passwords to change peoples’ forwarding and delegation settings. (Gmail enables you to forward your emails automatically, as well as grant others access to your account.)<br /> <br /> Google detected and has disrupted this campaign to take users’ passwords and monitor their emails. We have notified victims and secured their accounts. In addition, we have notified relevant government authorities.<br /> <br /> It’s important to stress that our internal systems have not been affected—these account hijackings were not the result of a security problem with Gmail itself. But we believe that being open about these security issues helps users better protect their information online.<br /> <br /> Here are some ways to improve your security when using Google products:<br /> <ul><li style="text-align: left;">Enable <a href="//www.google.com/support/accounts/bin/static.py?page=guide.cs&guide=1056283&topic=1056284">2-step verification</a>. This Gmail feature uses a phone and second password on sign-in, and it protected some accounts from this attack. So check out <a href="//www.youtube.com/watch?v=zMabEyrtPRg">this video</a> on setting up 2-step verification.</li> </ul><div style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjHn27RrVGDnjwdaVUVg1to31_6KFsT1-Z7Q25CqZxHPN2RSIARMf_RdVqxHD4JDccSXE8RYz8EwJk0hc0TXa94SmIVlFtj7HmqbeFv2N7VoM_sSJM5tvOfmoF3rgyluAKJhydb/s1600/2-step+promptB.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjHn27RrVGDnjwdaVUVg1to31_6KFsT1-Z7Q25CqZxHPN2RSIARMf_RdVqxHD4JDccSXE8RYz8EwJk0hc0TXa94SmIVlFtj7HmqbeFv2N7VoM_sSJM5tvOfmoF3rgyluAKJhydb/+promptB.png" width="500" /></a></div><ul><li>Use a <a href="//www.google.com/support/accounts/bin/answer.py?&answer=32040">strong password</a> for Google that you do not use on any other site. Here’s a <a href="//www.youtube.com/watch?v=0RCsHJfHL_4">video</a> to help.</li> <li>Enter your password only into a proper sign-in prompt on a <a href="https://www.google.com/">https://www.google.com</a> domain. We will <a href="http://mail.google.com/support/bin/answer.py?hl=en&answer=8253">never ask you to email your password</a> or enter it into a form that appears within an email message. Here’s a <a href="//www.youtube.com/watch?v=3vcLyvoKYZc">video</a> with more advice.</li> <li>Check your Gmail settings for suspicious <a href="http://mail.google.com/support/bin/answer.py?answer=10957">forwarding addresses</a> (“Forwarding and POP/IMAP” tab, Fig. 1) or <a href="http://mail.google.com/support/bin/answer.py?hl=en&ctx=mail&answer=138350">delegated accounts</a> (“Accounts” tab, Fig. 2).</li> </ul><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg0aJI1JKRVIBhgEoUd-Y-jcNnWqdTLl40-joStf5NipeBL7Ko3pYgjs7nLW_T03-jhpxSMqtt2q2OxD1e6eludQ9npeRXAaRw3C5ybjDuLfVdgMiIhbjiZN8MhVVY176ygZx0_/s1600/Picture+4.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="57" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg0aJI1JKRVIBhgEoUd-Y-jcNnWqdTLl40-joStf5NipeBL7Ko3pYgjs7nLW_T03-jhpxSMqtt2q2OxD1e6eludQ9npeRXAaRw3C5ybjDuLfVdgMiIhbjiZN8MhVVY176ygZx0_/s400/Picture+4.png" width="400" /></a></div><div style="text-align: center;"><i>Fig. 1</i></div><br /> <div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgSSNj_9QfW-np2CWJggVdNpNBbT3tlD7Ai0Px1Iu6g9HwdC_7lYEXJdQxea0dX5JJ4HsYrLr11XCoCO9Qbuee6lTPdVk_OZRjK3Gga9WwM2tJkFznGDvrvbGsNJTWj3JIQ0nVM/s1600/Picture+3.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="88" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgSSNj_9QfW-np2CWJggVdNpNBbT3tlD7Ai0Px1Iu6g9HwdC_7lYEXJdQxea0dX5JJ4HsYrLr11XCoCO9Qbuee6lTPdVk_OZRjK3Gga9WwM2tJkFznGDvrvbGsNJTWj3JIQ0nVM/s400/Picture+3.png" width="400" /></a></div><div style="text-align: center;"> <i>Fig. 2</i></div><ul><li>Watch for the red warnings about <a href="http://gmailblog.blogspot.com/2010/03/detecting-suspicious-account-activity.html">suspicious account activity</a> that may appear on top of your Gmail inbox.</li> <li>Review the security features offered by the <a href="//www.google.com/chrome/intl/en/more/security.html">Chrome browser</a>. If you don’t already use Chrome, consider switching your browser to Chrome.</li> <li>Explore other <a href="//www.google.com/help/security/">security recommendations</a> and a <a href="//www.youtube.com/watch?v=nOgsXdB67Pc">video with tips</a> on how to stay safe across the web.</li> </ul>Please spend ten minutes today taking steps to improve your online security so that you can experience all that the Internet offers—while also protecting your data.<br /> <br /> *We also relied on user reports and this <a href="http://contagiodump.blogspot.com/2011/02/targeted-attacks-against-personal.html">external report</a> to uncover the campaign described.<br /> <br /> <span class="byline-author">Posted by Eric Grosse, Engineering Director, Google Security Team</span> <span itemprop='author' itemscope='itemscope' itemtype='http://schema.org/Person'> <meta content='https://plus.google.com/116899029375914044550' itemprop='url'/> </span> </noscript> </div> </div> <div class='share'> <span class='gplus-share social-wrapper' data-href='https://plus.google.com/share?url=https://googleblog.blogspot.com/2011/06/ensuring-your-information-is-safe.html'> <img alt='Share on Google+' height='24' src='https://www.gstatic.com/images/branding/google_plus/2x/ic_w_post_gplus_black_24dp.png' width='24'/> </span> <span class='twitter-custom social-wrapper' data-href='http://twitter.com/share?text=Official Google Blog:Ensuring your information is safe online&url=https://googleblog.blogspot.com/2011/06/ensuring-your-information-is-safe.html&via=google'> <img alt='Share on Twitter' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_twitter_black_24dp.png' width='24'/> </span> <span class='fb-custom social-wrapper' data-href='https://www.facebook.com/sharer.php?u=https://googleblog.blogspot.com/2011/06/ensuring-your-information-is-safe.html'> <img alt='Share on Facebook' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_facebook_black_24dp.png' width='24'/> </span> </div> <div class='post-footer'> <div class='cmt_iframe_holder' data-href='https://googleblog.blogspot.com/2011/06/ensuring-your-information-is-safe.html' data-viewtype='FILTERED_POSTMOD'></div> <a href='https://plus.google.com/112374322230920073195' rel='author' style='display:none;'> Google </a> <div class='label-footer'> <span class='labels-caption'> Labels: </span> <span class='labels'> <a class='label' href='https://googleblog.blogspot.com/search/label/online%20safety' rel='tag'> online safety </a> , <a class='label' href='https://googleblog.blogspot.com/search/label/security' rel='tag'> security </a> </span> </div> </div> </div> <div class='post' data-id='7434164984599464174' itemscope='' itemtype='http://schema.org/BlogPosting'> <h2 class='title' itemprop='name'> <a href='https://googleblog.blogspot.com/2011/02/advanced-sign-in-security-for-your.html' itemprop='url' title='Advanced sign-in security for your Google account'> Advanced sign-in security for your Google account </a> </h2> <div class='post-header'> <div class='published'> <span class='publishdate' itemprop='datePublished'> February 10, 2011 </span> </div> </div> <div class='post-body'> <div class='post-content' itemprop='articleBody'> <script type='text/template'> <div><i>(Cross-posted on the <a href="http://gmailblog.blogspot.com/2011/02/advanced-sign-in-security-for-your.html">Gmail Blog</a>)</i></div><div><br /> </div>Has anyone you know ever lost control of an email account and inadvertently sent spam—or worse—to their friends and family? There are plenty of examples (like the classic <a href="http://gmailblog.blogspot.com/2010/03/detecting-suspicious-account-activity.html">"Mugged in London" scam</a>) that demonstrate why it's important to take steps to help secure your activities online. Your Gmail account, your photos, your private documents—if you reuse the same password on multiple sites and one of those sites gets hacked, or your password is conned out of you directly through a phishing scam, it can be used to access some of your most closely-held information.<br /> <br /> Most of us are used to entrusting our information to a password, but we know that some of you are looking for something stronger. As we announced to our Google Apps customers <a href="http://googleenterprise.blogspot.com/2010/09/more-secure-cloud-for-millions-of.html">a few months ago</a>, we've developed an advanced opt-in security feature called <i>2-step verification</i> that makes your Google Account significantly more secure by helping to verify that you're the real owner of your account. Now it's time to offer the same advanced protection to all of our users.<br /> <br /> 2-step verification requires two independent factors for authentication, much like you might see on your banking website: your password, plus a code obtained using your phone. Over the next few days, you'll see a new link on your <a href="https://www.google.com/accounts/ManageAccount">Account Settings page</a> that looks like this:<br /> <div><br /> <div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh8WQO1_T-LfSYan99RLTmVkF_1fIN3Kiz5bMmT3bJLI0Aubg1xXbfDT5_bdeW8CuzRvHH9MYnYIb2XfpzPNgjsFDKRZaD1DpiiErVaImFUtJ7LjW-g82RfVxjVQxFLNYWbvJc9/s1600/AccountSettings.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="251" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh8WQO1_T-LfSYan99RLTmVkF_1fIN3Kiz5bMmT3bJLI0Aubg1xXbfDT5_bdeW8CuzRvHH9MYnYIb2XfpzPNgjsFDKRZaD1DpiiErVaImFUtJ7LjW-g82RfVxjVQxFLNYWbvJc9/s400/AccountSettings.png" width="400" /></a></div><div style="text-align: center;"><br /> </div>Take your time to carefully set up 2-step verification—we expect it may take up to 15 minutes to enroll. A user-friendly set-up wizard will guide you through the process, including setting up a backup phone and creating backup codes in case you lose access to your primary phone. Once you enable 2-step verification, you'll see an extra page that prompts you for a code when you sign in to your account. After entering your password, Google will call you with the code, send you an SMS message or give you the choice to generate the code for yourself using a mobile application on your Android, BlackBerry or iPhone device. The choice is up to you. When you enter this code after correctly submitting your password we'll have a pretty good idea that the person signing in is actually you.<br /> <div><br /> <div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhylAgZrUSCmr9oCS1di0BLaL2k4fG0oVDQRh4pL7mHiU-cyH8TjUCfjnZyVJEpMgqGepM1Z0mI_NEOIsvake29Ol9haZVC1jHRxsee-EY4FUQYmQb7LKQ7O-5bGrw8IwNyNyLA/s1600/step1and2.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhylAgZrUSCmr9oCS1di0BLaL2k4fG0oVDQRh4pL7mHiU-cyH8TjUCfjnZyVJEpMgqGepM1Z0mI_NEOIsvake29Ol9haZVC1jHRxsee-EY4FUQYmQb7LKQ7O-5bGrw8IwNyNyLA/s500/step1and2.png" width="500" /></a></div><div style="text-align: center;"><br /> </div>It's an extra step, but it's one that significantly improves the security of your Google Account because it requires the powerful combination of both something you <i>know</i>—your username and password—and something that only you should <i>have</i>—your phone. A hacker would need access to both of these factors to gain access to your account. If you like, you can always choose a "Remember verification for this computer for 30 days" option, and you won't need to re-enter a code for another 30 days. You can also set up one-time <i>application-specific passwords</i> to sign in to your account from non-browser based applications that are designed to only ask for a password, and cannot prompt for the code.<br /> <br /> To learn more about 2-step verification and get started, visit our <a href="//www.google.com/support/accounts/bin/static.py?page=guide.cs&guide=1056283&topic=1056284&hl=en">Help Center</a>. And for more about staying safe online, see our ongoing <a href="http://googleblog.blogspot.com/search/label/security">security blog series</a> or visit <a href="http://www.staysafeonline.org/">http://www.staysafeonline.org/</a>. Be safe!<br /> <br /> <i><b>Update</b></i> <i>Dec 7, 2011</i>: Updated the screenshots in this post.<br /> <br /> <span class="byline-author">Posted by Nishit Shah, Product Manager, Google Security</span></div></div> <span itemprop='author' itemscope='itemscope' itemtype='http://schema.org/Person'> <meta content='https://plus.google.com/116899029375914044550' itemprop='url'/> </span> </script> <noscript> <div><i>(Cross-posted on the <a href="http://gmailblog.blogspot.com/2011/02/advanced-sign-in-security-for-your.html">Gmail Blog</a>)</i></div><div><br /> </div>Has anyone you know ever lost control of an email account and inadvertently sent spam—or worse—to their friends and family? There are plenty of examples (like the classic <a href="http://gmailblog.blogspot.com/2010/03/detecting-suspicious-account-activity.html">"Mugged in London" scam</a>) that demonstrate why it's important to take steps to help secure your activities online. Your Gmail account, your photos, your private documents—if you reuse the same password on multiple sites and one of those sites gets hacked, or your password is conned out of you directly through a phishing scam, it can be used to access some of your most closely-held information.<br /> <br /> Most of us are used to entrusting our information to a password, but we know that some of you are looking for something stronger. As we announced to our Google Apps customers <a href="http://googleenterprise.blogspot.com/2010/09/more-secure-cloud-for-millions-of.html">a few months ago</a>, we've developed an advanced opt-in security feature called <i>2-step verification</i> that makes your Google Account significantly more secure by helping to verify that you're the real owner of your account. Now it's time to offer the same advanced protection to all of our users.<br /> <br /> 2-step verification requires two independent factors for authentication, much like you might see on your banking website: your password, plus a code obtained using your phone. Over the next few days, you'll see a new link on your <a href="https://www.google.com/accounts/ManageAccount">Account Settings page</a> that looks like this:<br /> <div><br /> <div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh8WQO1_T-LfSYan99RLTmVkF_1fIN3Kiz5bMmT3bJLI0Aubg1xXbfDT5_bdeW8CuzRvHH9MYnYIb2XfpzPNgjsFDKRZaD1DpiiErVaImFUtJ7LjW-g82RfVxjVQxFLNYWbvJc9/s1600/AccountSettings.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="251" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh8WQO1_T-LfSYan99RLTmVkF_1fIN3Kiz5bMmT3bJLI0Aubg1xXbfDT5_bdeW8CuzRvHH9MYnYIb2XfpzPNgjsFDKRZaD1DpiiErVaImFUtJ7LjW-g82RfVxjVQxFLNYWbvJc9/s400/AccountSettings.png" width="400" /></a></div><div style="text-align: center;"><br /> </div>Take your time to carefully set up 2-step verification—we expect it may take up to 15 minutes to enroll. A user-friendly set-up wizard will guide you through the process, including setting up a backup phone and creating backup codes in case you lose access to your primary phone. Once you enable 2-step verification, you'll see an extra page that prompts you for a code when you sign in to your account. After entering your password, Google will call you with the code, send you an SMS message or give you the choice to generate the code for yourself using a mobile application on your Android, BlackBerry or iPhone device. The choice is up to you. When you enter this code after correctly submitting your password we'll have a pretty good idea that the person signing in is actually you.<br /> <div><br /> <div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhylAgZrUSCmr9oCS1di0BLaL2k4fG0oVDQRh4pL7mHiU-cyH8TjUCfjnZyVJEpMgqGepM1Z0mI_NEOIsvake29Ol9haZVC1jHRxsee-EY4FUQYmQb7LKQ7O-5bGrw8IwNyNyLA/s1600/step1and2.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhylAgZrUSCmr9oCS1di0BLaL2k4fG0oVDQRh4pL7mHiU-cyH8TjUCfjnZyVJEpMgqGepM1Z0mI_NEOIsvake29Ol9haZVC1jHRxsee-EY4FUQYmQb7LKQ7O-5bGrw8IwNyNyLA/s500/step1and2.png" width="500" /></a></div><div style="text-align: center;"><br /> </div>It's an extra step, but it's one that significantly improves the security of your Google Account because it requires the powerful combination of both something you <i>know</i>—your username and password—and something that only you should <i>have</i>—your phone. A hacker would need access to both of these factors to gain access to your account. If you like, you can always choose a "Remember verification for this computer for 30 days" option, and you won't need to re-enter a code for another 30 days. You can also set up one-time <i>application-specific passwords</i> to sign in to your account from non-browser based applications that are designed to only ask for a password, and cannot prompt for the code.<br /> <br /> To learn more about 2-step verification and get started, visit our <a href="//www.google.com/support/accounts/bin/static.py?page=guide.cs&guide=1056283&topic=1056284&hl=en">Help Center</a>. And for more about staying safe online, see our ongoing <a href="http://googleblog.blogspot.com/search/label/security">security blog series</a> or visit <a href="http://www.staysafeonline.org/">http://www.staysafeonline.org/</a>. Be safe!<br /> <br /> <i><b>Update</b></i> <i>Dec 7, 2011</i>: Updated the screenshots in this post.<br /> <br /> <span class="byline-author">Posted by Nishit Shah, Product Manager, Google Security</span></div></div> <span itemprop='author' itemscope='itemscope' itemtype='http://schema.org/Person'> <meta content='https://plus.google.com/116899029375914044550' itemprop='url'/> </span> </noscript> </div> </div> <div class='share'> <span class='gplus-share social-wrapper' data-href='https://plus.google.com/share?url=https://googleblog.blogspot.com/2011/02/advanced-sign-in-security-for-your.html'> <img alt='Share on Google+' height='24' src='https://www.gstatic.com/images/branding/google_plus/2x/ic_w_post_gplus_black_24dp.png' width='24'/> </span> <span class='twitter-custom social-wrapper' data-href='http://twitter.com/share?text=Official Google Blog:Advanced sign-in security for your Google account&url=https://googleblog.blogspot.com/2011/02/advanced-sign-in-security-for-your.html&via=google'> <img alt='Share on Twitter' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_twitter_black_24dp.png' width='24'/> </span> <span class='fb-custom social-wrapper' data-href='https://www.facebook.com/sharer.php?u=https://googleblog.blogspot.com/2011/02/advanced-sign-in-security-for-your.html'> <img alt='Share on Facebook' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_facebook_black_24dp.png' width='24'/> </span> </div> <div class='post-footer'> <div class='cmt_iframe_holder' data-href='https://googleblog.blogspot.com/2011/02/advanced-sign-in-security-for-your.html' data-viewtype='FILTERED_POSTMOD'></div> <a href='https://plus.google.com/112374322230920073195' rel='author' style='display:none;'> Google </a> <div class='label-footer'> <span class='labels-caption'> Labels: </span> <span class='labels'> <a class='label' href='https://googleblog.blogspot.com/search/label/apps' rel='tag'> apps </a> , <a class='label' href='https://googleblog.blogspot.com/search/label/security' rel='tag'> security </a> </span> </div> </div> </div> <div class='post' data-id='3953217541407381323' itemscope='' itemtype='http://schema.org/BlogPosting'> <h2 class='title' itemprop='name'> <a href='https://googleblog.blogspot.com/2010/10/national-cyber-security-awareness-month.html' itemprop='url' title='National Cyber Security Awareness Month 2010: Stop. Think. Connect.'> National Cyber Security Awareness Month 2010: Stop. Think. Connect. </a> </h2> <div class='post-header'> <div class='published'> <span class='publishdate' itemprop='datePublished'> October 4, 2010 </span> </div> </div> <div class='post-body'> <div class='post-content' itemprop='articleBody'> <script type='text/template'> Governments, industry and everyday people have been abuzz this year about online security to a larger extent than ever before. People are talking about their information, how they share it with others and how they secure it. With more information moving online, and with cyber attacks on the rise, we think it’s important that we keep the conversation about security flowing.<br /><br />Google has renewed its commitment to security this year and has pushed industry boundaries to help people better protect their information in new ways. Here are just a few examples: We became the first major email provider to offer <a href="http://gmailblog.blogspot.com/2010/01/default-https-access-for-gmail.html">default HTTPS encryption</a> for the entire email session, and we introduced an <a href="http://googleblog.blogspot.com/2010/05/search-more-securely-with-encrypted.html">encrypted search option</a> for Google.com. We designed a <a href="http://googleonlinesecurity.blogspot.com/2010/09/moving-security-beyond-passwords.html">new system</a> to make Google Accounts more secure, and added <a href="http://gmailblog.blogspot.com/2010/03/detecting-suspicious-account-activity.html">suspicious activity detection</a> for our users. Google Apps became the first suite of cloud computing applications to receive Federal Information Security Management Act (FISMA) <a href="http://googleenterprise.blogspot.com/2010/07/google-apps-for-government.html">certification</a> from the U.S. government. We also published new security <a href="http://googleonlinesecurity.blogspot.com/2010/09/safe-browsing-alerts-for-network.html">products</a>, <a href="http://googleonlinesecurity.blogspot.com/2010/05/do-know-evil-web-application.html">tools</a> and <a href="http://googleonlinesecurity.blogspot.com/2010/04/rise-of-fake-anti-virus.html">research</a> to help web developers and network administrators make the rest of the web more secure.<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5GySmPWVopO-FVaZHM77fKO4COW4-pAxvjQdCA3uyRxz6mUHQjNgMxh87KIEWo99id_pmuMZN_bUJ0JQ7AHafm1ZhaPYOBnT6C9WtAmDYIsmqm4dPKe692PCRQonfNA3gS0C5/s1600/CM_10-468x60_web_animation.jpg"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5524290512476131682" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5GySmPWVopO-FVaZHM77fKO4COW4-pAxvjQdCA3uyRxz6mUHQjNgMxh87KIEWo99id_pmuMZN_bUJ0JQ7AHafm1ZhaPYOBnT6C9WtAmDYIsmqm4dPKe692PCRQonfNA3gS0C5/s400/CM_10-468x60_web_animation.jpg" style="display: block; margin: 0px auto 10px; text-align: center; cursor: pointer; width: 400px; height: 51px;" /></a><br />I sit on the board of the <a href="http://www.staysafeonline.org/">National Cyber Security Alliance</a> (NCSA) to promote work that encourages safer online habits. Together with that organization, the U.S. Department of Homeland Security (DHS) and a host of other companies, Google is taking the month of October to recognize National Cyber Security Awareness Month. As we did in a <a href="http://googlepublicpolicy.blogspot.com/2009/11/next-steps-in-cyber-security-awareness.html">blog post series</a> last year, we’ll explore simple ways that people can make use of Google’s technologies and tools, as well other freely available resources and advice, to better protect themselves and their information.<br /><br />We will post links here throughout the month, so be sure to check back often:<div><a href="http://googledocs.blogspot.com/2010/10/tips-tricks-sharing-google-docs-like.html">Tips and Tricks: Sharing Google Docs Like a Pro</a><br /><a href="http://googleonlinesecurity.blogspot.com/2010/10/protecting-your-data-in-cloud.html">Protect your data in the cloud</a><br /><a href="http://googleonlinesecurity.blogspot.com/2010/10/this-internet-is-your-internet-digital.html">This Internet is Your Internet: Digital Citizenship from California to Washtenaw County</a></div><div><a href="http://chrome.blogspot.com/2010/10/understanding-omnibox-for-better.html">Understanding the omnibox for better security</a> (Google Chrome Blog)</div><div><a href="http://buzz.blogger.com/2010/10/safe-browsing-on-blogger.html">Safe browsing on Blogger</a></div><div><a href="http://googlecheckout.blogspot.com/2010/10/stop-think-connect-to-protect-yourself.html">Stop. Think. Connect. To protect yourself from fake Checkout invoices.</a></div><div><a href="http://en.blog.orkut.com/2010/10/tips-for-more-secure-orkut-experience.html">Tips for a more secure orkut experience</a></div><div><a href="http://googlecheckout.blogspot.com/2010/10/remember-these-tips-for-safer-shopping.html">Remember these tips for safer shopping</a><br /><br />Remember, even with so many people and groups focused on creating a safer web experience for everyone, we all have a responsibility to take steps to protect ourselves online. The NCSA recommends that we keep our wits about us and think carefully about our online actions before we take them. In that spirit, we encourage you to: <a href="http://safetyandsecuritymessaging.org/">Stop. Think. Connect.</a><br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj1zh246lFNhlYSbJVgIPqcr9zOcYBsE-sJkFL3OAwVDvXrmPlh5n71OQRcFqOLouPo94VEzKKCejly_MYfOSzhwW-RYE7Z9hbp8InW-qZ87oiw3E4mHotNou0HIwWfOKQRo07h/s1600/STC_color.jpg"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5524290515623836754" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj1zh246lFNhlYSbJVgIPqcr9zOcYBsE-sJkFL3OAwVDvXrmPlh5n71OQRcFqOLouPo94VEzKKCejly_MYfOSzhwW-RYE7Z9hbp8InW-qZ87oiw3E4mHotNou0HIwWfOKQRo07h/s400/STC_color.jpg" style="display: block; margin: 0px auto 10px; text-align: center; cursor: pointer; width: 400px; height: 99px;" /></a><br /><span class="byline-author">Posted by Eric Davis, Public Policy Manager, Security</span></div> <span itemprop='author' itemscope='itemscope' itemtype='http://schema.org/Person'> <meta content='https://plus.google.com/116899029375914044550' itemprop='url'/> </span> </script> <noscript> Governments, industry and everyday people have been abuzz this year about online security to a larger extent than ever before. People are talking about their information, how they share it with others and how they secure it. With more information moving online, and with cyber attacks on the rise, we think it’s important that we keep the conversation about security flowing.<br /><br />Google has renewed its commitment to security this year and has pushed industry boundaries to help people better protect their information in new ways. Here are just a few examples: We became the first major email provider to offer <a href="http://gmailblog.blogspot.com/2010/01/default-https-access-for-gmail.html">default HTTPS encryption</a> for the entire email session, and we introduced an <a href="http://googleblog.blogspot.com/2010/05/search-more-securely-with-encrypted.html">encrypted search option</a> for Google.com. We designed a <a href="http://googleonlinesecurity.blogspot.com/2010/09/moving-security-beyond-passwords.html">new system</a> to make Google Accounts more secure, and added <a href="http://gmailblog.blogspot.com/2010/03/detecting-suspicious-account-activity.html">suspicious activity detection</a> for our users. Google Apps became the first suite of cloud computing applications to receive Federal Information Security Management Act (FISMA) <a href="http://googleenterprise.blogspot.com/2010/07/google-apps-for-government.html">certification</a> from the U.S. government. We also published new security <a href="http://googleonlinesecurity.blogspot.com/2010/09/safe-browsing-alerts-for-network.html">products</a>, <a href="http://googleonlinesecurity.blogspot.com/2010/05/do-know-evil-web-application.html">tools</a> and <a href="http://googleonlinesecurity.blogspot.com/2010/04/rise-of-fake-anti-virus.html">research</a> to help web developers and network administrators make the rest of the web more secure.<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5GySmPWVopO-FVaZHM77fKO4COW4-pAxvjQdCA3uyRxz6mUHQjNgMxh87KIEWo99id_pmuMZN_bUJ0JQ7AHafm1ZhaPYOBnT6C9WtAmDYIsmqm4dPKe692PCRQonfNA3gS0C5/s1600/CM_10-468x60_web_animation.jpg"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5524290512476131682" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5GySmPWVopO-FVaZHM77fKO4COW4-pAxvjQdCA3uyRxz6mUHQjNgMxh87KIEWo99id_pmuMZN_bUJ0JQ7AHafm1ZhaPYOBnT6C9WtAmDYIsmqm4dPKe692PCRQonfNA3gS0C5/s400/CM_10-468x60_web_animation.jpg" style="display: block; margin: 0px auto 10px; text-align: center; cursor: pointer; width: 400px; height: 51px;" /></a><br />I sit on the board of the <a href="http://www.staysafeonline.org/">National Cyber Security Alliance</a> (NCSA) to promote work that encourages safer online habits. Together with that organization, the U.S. Department of Homeland Security (DHS) and a host of other companies, Google is taking the month of October to recognize National Cyber Security Awareness Month. As we did in a <a href="http://googlepublicpolicy.blogspot.com/2009/11/next-steps-in-cyber-security-awareness.html">blog post series</a> last year, we’ll explore simple ways that people can make use of Google’s technologies and tools, as well other freely available resources and advice, to better protect themselves and their information.<br /><br />We will post links here throughout the month, so be sure to check back often:<div><a href="http://googledocs.blogspot.com/2010/10/tips-tricks-sharing-google-docs-like.html">Tips and Tricks: Sharing Google Docs Like a Pro</a><br /><a href="http://googleonlinesecurity.blogspot.com/2010/10/protecting-your-data-in-cloud.html">Protect your data in the cloud</a><br /><a href="http://googleonlinesecurity.blogspot.com/2010/10/this-internet-is-your-internet-digital.html">This Internet is Your Internet: Digital Citizenship from California to Washtenaw County</a></div><div><a href="http://chrome.blogspot.com/2010/10/understanding-omnibox-for-better.html">Understanding the omnibox for better security</a> (Google Chrome Blog)</div><div><a href="http://buzz.blogger.com/2010/10/safe-browsing-on-blogger.html">Safe browsing on Blogger</a></div><div><a href="http://googlecheckout.blogspot.com/2010/10/stop-think-connect-to-protect-yourself.html">Stop. Think. Connect. To protect yourself from fake Checkout invoices.</a></div><div><a href="http://en.blog.orkut.com/2010/10/tips-for-more-secure-orkut-experience.html">Tips for a more secure orkut experience</a></div><div><a href="http://googlecheckout.blogspot.com/2010/10/remember-these-tips-for-safer-shopping.html">Remember these tips for safer shopping</a><br /><br />Remember, even with so many people and groups focused on creating a safer web experience for everyone, we all have a responsibility to take steps to protect ourselves online. The NCSA recommends that we keep our wits about us and think carefully about our online actions before we take them. In that spirit, we encourage you to: <a href="http://safetyandsecuritymessaging.org/">Stop. Think. Connect.</a><br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj1zh246lFNhlYSbJVgIPqcr9zOcYBsE-sJkFL3OAwVDvXrmPlh5n71OQRcFqOLouPo94VEzKKCejly_MYfOSzhwW-RYE7Z9hbp8InW-qZ87oiw3E4mHotNou0HIwWfOKQRo07h/s1600/STC_color.jpg"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5524290515623836754" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj1zh246lFNhlYSbJVgIPqcr9zOcYBsE-sJkFL3OAwVDvXrmPlh5n71OQRcFqOLouPo94VEzKKCejly_MYfOSzhwW-RYE7Z9hbp8InW-qZ87oiw3E4mHotNou0HIwWfOKQRo07h/s400/STC_color.jpg" style="display: block; margin: 0px auto 10px; text-align: center; cursor: pointer; width: 400px; height: 99px;" /></a><br /><span class="byline-author">Posted by Eric Davis, Public Policy Manager, Security</span></div> <span itemprop='author' itemscope='itemscope' itemtype='http://schema.org/Person'> <meta content='https://plus.google.com/116899029375914044550' itemprop='url'/> </span> </noscript> </div> </div> <div class='share'> <span class='gplus-share social-wrapper' data-href='https://plus.google.com/share?url=https://googleblog.blogspot.com/2010/10/national-cyber-security-awareness-month.html'> <img alt='Share on Google+' height='24' src='https://www.gstatic.com/images/branding/google_plus/2x/ic_w_post_gplus_black_24dp.png' width='24'/> </span> <span class='twitter-custom social-wrapper' data-href='http://twitter.com/share?text=Official Google Blog:National Cyber Security Awareness Month 2010: Stop. Think. Connect.&url=https://googleblog.blogspot.com/2010/10/national-cyber-security-awareness-month.html&via=google'> <img alt='Share on Twitter' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_twitter_black_24dp.png' width='24'/> </span> <span class='fb-custom social-wrapper' data-href='https://www.facebook.com/sharer.php?u=https://googleblog.blogspot.com/2010/10/national-cyber-security-awareness-month.html'> <img alt='Share on Facebook' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_facebook_black_24dp.png' width='24'/> </span> </div> <div class='post-footer'> <div class='cmt_iframe_holder' data-href='https://googleblog.blogspot.com/2010/10/national-cyber-security-awareness-month.html' data-viewtype='FILTERED_POSTMOD'></div> <a href='https://plus.google.com/112374322230920073195' rel='author' style='display:none;'> Google </a> <div class='label-footer'> <span class='labels-caption'> Labels: </span> <span class='labels'> <a class='label' href='https://googleblog.blogspot.com/search/label/security' rel='tag'> security </a> </span> </div> </div> </div> <div class='post' data-id='8995709899135813370' itemscope='' itemtype='http://schema.org/BlogPosting'> <h2 class='title' itemprop='name'> <a href='https://googleblog.blogspot.com/2010/09/three-million-businesses-have-gone.html' itemprop='url' title='Three million businesses have gone Google: celebrating growth, innovation and security'> Three million businesses have gone Google: celebrating growth, innovation and security </a> </h2> <div class='post-header'> <div class='published'> <span class='publishdate' itemprop='datePublished'> September 20, 2010 </span> </div> </div> <div class='post-body'> <div class='post-content' itemprop='articleBody'> <script type='text/template'> Today we’re hosting more than 300 CIOs and IT professionals from around the world in Paris at Google Atmosphere, our annual European event dedicated to cloud computing—web-based applications that are built on shared infrastructure and delivered through the browser. This year, the discussion at Atmosphere is focused on how companies can benefit from the breakthroughs in productivity and security that cloud-based applications are uniquely capable of delivering.<br /><br />This event also marks some major milestones:<br /><ul><li>As of today, more than 3 million businesses have <a href="//www.google.com/apps/intl/en/business/gogoogle.html">gone Google</a>, and over 30 million users within businesses, schools and organizations now depend on our messaging and collaboration tools.</li><li>We’re launching new cloud-powered capabilities: two-step verification to help enhance security and soon, mobile editing in Google Docs on Android and the iPad™.</li></ul>First, Google Apps Premier, Education and Government Edition administrators can now have users sign in with the combination of their password (something they <i>know</i>) and a one-time verification code provided by a mobile phone (something they <i>have</i>). Users can continue to access Google Apps from Internet-connected devices, but with <a href="http://googleenterprise.blogspot.com/2010/09/more-secure-cloud-for-millions-of.html">stronger protections</a> to help fend off risks like phishing scams and password reuse. For the first time, we’re making this technology accessible to organizations large and small without the costs and complexities that have historically limited two-step verification to large enterprises with deep pockets. Furthermore, in the coming months, Standard Edition and hundreds of millions of individual Google users will be able to enjoy this feature as well.<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhDMVPnKw3cSHZLen-oAvmcrWXy47O7tCMwDkSvqGKam_PcgfTWVQldD3nYQAP-HG4ghrCzIAGDsqCUzeKWBm7nDzbPjDZK2qPCuorrjFZhg9s_jT8NHj2_x9C3xHRHRDo9rEVe/s1600/dggtdpb9_142hfn2v3g9_b.png"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5518859042136089426" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhDMVPnKw3cSHZLen-oAvmcrWXy47O7tCMwDkSvqGKam_PcgfTWVQldD3nYQAP-HG4ghrCzIAGDsqCUzeKWBm7nDzbPjDZK2qPCuorrjFZhg9s_jT8NHj2_x9C3xHRHRDo9rEVe/s400/dggtdpb9_142hfn2v3g9_b.png" style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 207px;" /></a><br />Second, today we demonstrated new mobile editing capabilities for Google Docs on the Android platform and the iPad. In the next few weeks, co-workers around the world will soon be able to co-edit files simultaneously from an even wider array of devices.<br /><br />Only cloud computing is able to deliver the whole package of productivity-enhancing collaboration, superior reliability and virtually unlimited scale at a price that’s affordable for any size organization. Our Atmosphere event is a nice opportunity to step back and fully appreciate the power of the cloud with customers and future customers alike.<br /><br /><span class="byline-author">Posted by Dave Girouard, President, Google Enterprise</span> <span itemprop='author' itemscope='itemscope' itemtype='http://schema.org/Person'> <meta content='https://plus.google.com/116899029375914044550' itemprop='url'/> </span> </script> <noscript> Today we’re hosting more than 300 CIOs and IT professionals from around the world in Paris at Google Atmosphere, our annual European event dedicated to cloud computing—web-based applications that are built on shared infrastructure and delivered through the browser. This year, the discussion at Atmosphere is focused on how companies can benefit from the breakthroughs in productivity and security that cloud-based applications are uniquely capable of delivering.<br /><br />This event also marks some major milestones:<br /><ul><li>As of today, more than 3 million businesses have <a href="//www.google.com/apps/intl/en/business/gogoogle.html">gone Google</a>, and over 30 million users within businesses, schools and organizations now depend on our messaging and collaboration tools.</li><li>We’re launching new cloud-powered capabilities: two-step verification to help enhance security and soon, mobile editing in Google Docs on Android and the iPad™.</li></ul>First, Google Apps Premier, Education and Government Edition administrators can now have users sign in with the combination of their password (something they <i>know</i>) and a one-time verification code provided by a mobile phone (something they <i>have</i>). Users can continue to access Google Apps from Internet-connected devices, but with <a href="http://googleenterprise.blogspot.com/2010/09/more-secure-cloud-for-millions-of.html">stronger protections</a> to help fend off risks like phishing scams and password reuse. For the first time, we’re making this technology accessible to organizations large and small without the costs and complexities that have historically limited two-step verification to large enterprises with deep pockets. Furthermore, in the coming months, Standard Edition and hundreds of millions of individual Google users will be able to enjoy this feature as well.<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhDMVPnKw3cSHZLen-oAvmcrWXy47O7tCMwDkSvqGKam_PcgfTWVQldD3nYQAP-HG4ghrCzIAGDsqCUzeKWBm7nDzbPjDZK2qPCuorrjFZhg9s_jT8NHj2_x9C3xHRHRDo9rEVe/s1600/dggtdpb9_142hfn2v3g9_b.png"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5518859042136089426" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhDMVPnKw3cSHZLen-oAvmcrWXy47O7tCMwDkSvqGKam_PcgfTWVQldD3nYQAP-HG4ghrCzIAGDsqCUzeKWBm7nDzbPjDZK2qPCuorrjFZhg9s_jT8NHj2_x9C3xHRHRDo9rEVe/s400/dggtdpb9_142hfn2v3g9_b.png" style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 207px;" /></a><br />Second, today we demonstrated new mobile editing capabilities for Google Docs on the Android platform and the iPad. In the next few weeks, co-workers around the world will soon be able to co-edit files simultaneously from an even wider array of devices.<br /><br />Only cloud computing is able to deliver the whole package of productivity-enhancing collaboration, superior reliability and virtually unlimited scale at a price that’s affordable for any size organization. Our Atmosphere event is a nice opportunity to step back and fully appreciate the power of the cloud with customers and future customers alike.<br /><br /><span class="byline-author">Posted by Dave Girouard, President, Google Enterprise</span> <span itemprop='author' itemscope='itemscope' itemtype='http://schema.org/Person'> <meta content='https://plus.google.com/116899029375914044550' itemprop='url'/> </span> </noscript> </div> </div> <div class='share'> <span class='gplus-share social-wrapper' data-href='https://plus.google.com/share?url=https://googleblog.blogspot.com/2010/09/three-million-businesses-have-gone.html'> <img alt='Share on Google+' height='24' src='https://www.gstatic.com/images/branding/google_plus/2x/ic_w_post_gplus_black_24dp.png' width='24'/> </span> <span class='twitter-custom social-wrapper' data-href='http://twitter.com/share?text=Official Google Blog:Three million businesses have gone Google: celebrating growth, innovation and security&url=https://googleblog.blogspot.com/2010/09/three-million-businesses-have-gone.html&via=google'> <img alt='Share on Twitter' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_twitter_black_24dp.png' width='24'/> </span> <span class='fb-custom social-wrapper' data-href='https://www.facebook.com/sharer.php?u=https://googleblog.blogspot.com/2010/09/three-million-businesses-have-gone.html'> <img alt='Share on Facebook' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_facebook_black_24dp.png' width='24'/> </span> </div> <div class='post-footer'> <div class='cmt_iframe_holder' data-href='https://googleblog.blogspot.com/2010/09/three-million-businesses-have-gone.html' data-viewtype='FILTERED_POSTMOD'></div> <a href='https://plus.google.com/112374322230920073195' rel='author' style='display:none;'> Google </a> <div class='label-footer'> <span class='labels-caption'> Labels: </span> <span class='labels'> <a class='label' href='https://googleblog.blogspot.com/search/label/apps' rel='tag'> apps </a> , <a class='label' href='https://googleblog.blogspot.com/search/label/google%20for%20work' rel='tag'> google for work </a> , <a class='label' href='https://googleblog.blogspot.com/search/label/security' rel='tag'> security </a> </span> </div> </div> </div> <div class='post' data-id='4702122515250759936' itemscope='' itemtype='http://schema.org/BlogPosting'> <h2 class='title' itemprop='name'> <a href='https://googleblog.blogspot.com/2010/09/simpler-sign-ups-for-yahoo-users-with.html' itemprop='url' title='Simpler sign-ups for Yahoo! users with OpenID'> Simpler sign-ups for Yahoo! users with OpenID </a> </h2> <div class='post-header'> <div class='published'> <span class='publishdate' itemprop='datePublished'> September 7, 2010 </span> </div> </div> <div class='post-body'> <div class='post-content' itemprop='articleBody'> <script type='text/template'> How many times have you created a new account at a website and seen a message that said: “Thank you for creating an account. To activate your new account, please access your email and click the verification URL provided.”<br /><br />Even though you just want to start using the website, this lengthy process requires you to manually perform a whole bunch of steps—including switching to your mailbox, trying to find the message the website sent you (which might be in your Spam folder), opening the message, clicking the link, etc. Until recently, we also required people to follow these steps if they wanted to sign up for a Google Account using their existing email address, such as a @yahoo.com, @hotmail.com, or other address.<br /><br />To make this process simpler, we’re now using an Internet standard called <a href="http://openid.net/">OpenID</a> which is supported by several email providers, including Yahoo!. Instead of the process above, Yahoo! users who sign up with Google see the page below with a button that sends them to Yahoo! for verification.<div><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgKQyjqqEzHn1bH4aWfElquYbs5gWQTlsfFZ8EDd5EEK7upCiAakwrKPqHzKAbelv9Dyr5fpeacsACPPzqxoSsNsL5dPl-4zDmAqEDLLAMG43JKjz-AxltbabY2n8k2pV4q0Gg_/s1600/1rB-QUeRuk5C3H1jjAhtE6HUmx5-P.png"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5514200777933853650" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgKQyjqqEzHn1bH4aWfElquYbs5gWQTlsfFZ8EDd5EEK7upCiAakwrKPqHzKAbelv9Dyr5fpeacsACPPzqxoSsNsL5dPl-4zDmAqEDLLAMG43JKjz-AxltbabY2n8k2pV4q0Gg_/s400/1rB-QUeRuk5C3H1jjAhtE6HUmx5-P.png" style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 143px;" /></a><br />Once you click that button, Yahoo! shows you a page to get your consent to share your email address with Google.<div><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjdBqzf61dX74kDfwCAjYrobyjdMYJT7Lwa2hPF8msUwWyswfoU4Q-J6PQFsWAHf3sExasj-9ItuG25ckuvWamaRx8cVYvPO0wo41n21kYfigO2f4ZmljI4-zEv4GWGYRxeWycv/s1600/1l7u1uwu7Bu-qYKNJ21KTDsynvmMD.png"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5514200783987849234" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjdBqzf61dX74kDfwCAjYrobyjdMYJT7Lwa2hPF8msUwWyswfoU4Q-J6PQFsWAHf3sExasj-9ItuG25ckuvWamaRx8cVYvPO0wo41n21kYfigO2f4ZmljI4-zEv4GWGYRxeWycv/s400/1l7u1uwu7Bu-qYKNJ21KTDsynvmMD.png" style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 262px;" /></a><br />After you agree, you’re done and can start using any Google service, such as Google Groups, Docs, Reader, AdWords, etc. We have found that a much larger number of people complete the email verification process when this method is used.<br /><br />In the future we hope to expand this feature to other email providers, and we also hope other website operators will read more on the <a href="http://googlecode.blogspot.com/2010/09/sign-up-with-google-using-openid.html">Google Code Blog</a> about how they can implement a similar feature.<br /><br /><span class="byline-author">Posted by Eric Sachs, Senior Product Manager, Google Security</span></div></div> <span itemprop='author' itemscope='itemscope' itemtype='http://schema.org/Person'> <meta content='https://plus.google.com/116899029375914044550' itemprop='url'/> </span> </script> <noscript> How many times have you created a new account at a website and seen a message that said: “Thank you for creating an account. To activate your new account, please access your email and click the verification URL provided.”<br /><br />Even though you just want to start using the website, this lengthy process requires you to manually perform a whole bunch of steps—including switching to your mailbox, trying to find the message the website sent you (which might be in your Spam folder), opening the message, clicking the link, etc. Until recently, we also required people to follow these steps if they wanted to sign up for a Google Account using their existing email address, such as a @yahoo.com, @hotmail.com, or other address.<br /><br />To make this process simpler, we’re now using an Internet standard called <a href="http://openid.net/">OpenID</a> which is supported by several email providers, including Yahoo!. Instead of the process above, Yahoo! users who sign up with Google see the page below with a button that sends them to Yahoo! for verification.<div><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgKQyjqqEzHn1bH4aWfElquYbs5gWQTlsfFZ8EDd5EEK7upCiAakwrKPqHzKAbelv9Dyr5fpeacsACPPzqxoSsNsL5dPl-4zDmAqEDLLAMG43JKjz-AxltbabY2n8k2pV4q0Gg_/s1600/1rB-QUeRuk5C3H1jjAhtE6HUmx5-P.png"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5514200777933853650" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgKQyjqqEzHn1bH4aWfElquYbs5gWQTlsfFZ8EDd5EEK7upCiAakwrKPqHzKAbelv9Dyr5fpeacsACPPzqxoSsNsL5dPl-4zDmAqEDLLAMG43JKjz-AxltbabY2n8k2pV4q0Gg_/s400/1rB-QUeRuk5C3H1jjAhtE6HUmx5-P.png" style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 143px;" /></a><br />Once you click that button, Yahoo! shows you a page to get your consent to share your email address with Google.<div><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjdBqzf61dX74kDfwCAjYrobyjdMYJT7Lwa2hPF8msUwWyswfoU4Q-J6PQFsWAHf3sExasj-9ItuG25ckuvWamaRx8cVYvPO0wo41n21kYfigO2f4ZmljI4-zEv4GWGYRxeWycv/s1600/1l7u1uwu7Bu-qYKNJ21KTDsynvmMD.png"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5514200783987849234" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjdBqzf61dX74kDfwCAjYrobyjdMYJT7Lwa2hPF8msUwWyswfoU4Q-J6PQFsWAHf3sExasj-9ItuG25ckuvWamaRx8cVYvPO0wo41n21kYfigO2f4ZmljI4-zEv4GWGYRxeWycv/s400/1l7u1uwu7Bu-qYKNJ21KTDsynvmMD.png" style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 262px;" /></a><br />After you agree, you’re done and can start using any Google service, such as Google Groups, Docs, Reader, AdWords, etc. We have found that a much larger number of people complete the email verification process when this method is used.<br /><br />In the future we hope to expand this feature to other email providers, and we also hope other website operators will read more on the <a href="http://googlecode.blogspot.com/2010/09/sign-up-with-google-using-openid.html">Google Code Blog</a> about how they can implement a similar feature.<br /><br /><span class="byline-author">Posted by Eric Sachs, Senior Product Manager, Google Security</span></div></div> <span itemprop='author' itemscope='itemscope' itemtype='http://schema.org/Person'> <meta content='https://plus.google.com/116899029375914044550' itemprop='url'/> </span> </noscript> </div> </div> <div class='share'> <span class='gplus-share social-wrapper' data-href='https://plus.google.com/share?url=https://googleblog.blogspot.com/2010/09/simpler-sign-ups-for-yahoo-users-with.html'> <img alt='Share on Google+' height='24' src='https://www.gstatic.com/images/branding/google_plus/2x/ic_w_post_gplus_black_24dp.png' width='24'/> </span> <span class='twitter-custom social-wrapper' data-href='http://twitter.com/share?text=Official Google Blog:Simpler sign-ups for Yahoo! users with OpenID&url=https://googleblog.blogspot.com/2010/09/simpler-sign-ups-for-yahoo-users-with.html&via=google'> <img alt='Share on Twitter' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_twitter_black_24dp.png' width='24'/> </span> <span class='fb-custom social-wrapper' data-href='https://www.facebook.com/sharer.php?u=https://googleblog.blogspot.com/2010/09/simpler-sign-ups-for-yahoo-users-with.html'> <img alt='Share on Facebook' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_facebook_black_24dp.png' width='24'/> </span> </div> <div class='post-footer'> <div class='cmt_iframe_holder' data-href='https://googleblog.blogspot.com/2010/09/simpler-sign-ups-for-yahoo-users-with.html' data-viewtype='FILTERED_POSTMOD'></div> <a href='https://plus.google.com/112374322230920073195' rel='author' style='display:none;'> Google </a> <div class='label-footer'> <span class='labels-caption'> Labels: </span> <span class='labels'> <a class='label' href='https://googleblog.blogspot.com/search/label/security' rel='tag'> security </a> </span> </div> </div> </div> <div class='post' data-id='6010524259016209488' itemscope='' itemtype='http://schema.org/BlogPosting'> <h2 class='title' itemprop='name'> <a href='https://googleblog.blogspot.com/2010/05/search-more-securely-with-encrypted.html' itemprop='url' title='Search more securely with encrypted Google web search'> Search more securely with encrypted Google web search </a> </h2> <div class='post-header'> <div class='published'> <span class='publishdate' itemprop='datePublished'> May 21, 2010 </span> </div> </div> <div class='post-body'> <div class='post-content' itemprop='articleBody'> <script type='text/template'> <span style="font-style:italic;"><span><b>Update June 25, 2010: </b></span><b><span class="Apple-style-span" style="font-style: normal;">Since we introduced our encrypted search option last month, we’ve been listening closely to user feedback. Many users appreciate the capability to perform searches with better protection against snooping from third parties. We’ve also heard about some challenges faced by various school districts, and today, we want to inform you that we’ve moved encrypted search from <a href="https://www.google.com/">https://www.google.com</a> to <a href="https://encrypted.google.com/">https://encrypted.google.com</a>. The site functions in the same way. For more information on this change, please read on <a href="http://googleenterprise.blogspot.com/2010/06/update-on-encrypted-web-search-in.html">here</a>.</span></b></span><br /><br />As people spend more time on the Internet, they want greater control over who has access to their online communications. Many Internet services use what are known as Secure Sockets Layer (SSL) connections to encrypt information that travels between your computer and their service. Usually recognized by a web address starting with “https” or a browser lock icon, this technology is regularly used by online banking sites and e-commerce websites. Other sites may also implement SSL in a more limited fashion, for example, to help protect your passwords when you enter your login information.<br /><br />Years ago Google added SSL encryption to products ranging from Gmail to Google Docs and others, and we continue to enable encryption on more services. Like banking and e-commerce sites, Google’s encryption extends beyond login passwords to the entire service. This session-wide encryption is a significant privacy advantage over systems that only encrypt login pages and credit card information. Early this year, we took an important step forward by making SSL the <a href="http://gmailblog.blogspot.com/2010/01/default-https-access-for-gmail.html">default setting for all Gmail users</a>. And today we’re gradually rolling out a new choice to search more securely at <a href="https://www.google.com/">https://www.google.com</a>.<br /><br />When you search on <a href="https://www.google.com/">https://www.google.com</a>, an encrypted connection is created between your browser and Google. This secured channel helps protect your search terms and your search results pages from being intercepted by a third party on your network. The service includes a modified logo to help indicate that you’re searching using SSL and that you may encounter a somewhat different Google search experience, but as always, remember to check the start of the address bar for “https” and your browser lock indicators:<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgv7r4sUE9RFCHR4f6Th7Fxqqflj7U4KJfXazV0avpGhp53WontYM2DkOUq_wBsokIsO_JK_3iCJ8bS4dJAWPmVHqXMd50WmwQooDWwD0DktoWniXfiiV40EIyfsuM8Wf8BEAYU/s1600/ssl+search.png"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5473790372835637890" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgv7r4sUE9RFCHR4f6Th7Fxqqflj7U4KJfXazV0avpGhp53WontYM2DkOUq_wBsokIsO_JK_3iCJ8bS4dJAWPmVHqXMd50WmwQooDWwD0DktoWniXfiiV40EIyfsuM8Wf8BEAYU/s400/ssl+search.png" style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 129px;" /></a>Today’s release comes with a “beta” label for a few reasons. First, it currently covers only the core Google web search product. To help avoid misunderstanding, when you search using SSL, you won’t see links to offerings like Image Search and Maps that, for the most part, don’t support SSL at this time. Also, since SSL connections require additional time to set up the encryption between your browser and the remote web server, your experience with search over SSL might be slightly slower than your regular Google search experience. What won’t change is that you will still get the same great search results.<br /><br />A few notes to remember: Google will still <a href="//www.google.com/privacy_faq.html#toc-store">maintain search data</a> to improve your search quality and to provide better service. Searching over SSL doesn’t reduce the data sent to Google — it only hides that data from third parties who seek it. And clicking on any of the web results, including Google universal search results for unsupported services like Google Images, could take you out of SSL mode. Our hope is that more websites and services will add support for SSL to help create a better and more consistent experience for you.<br /><br />We think users will appreciate this new option for searching. It’s a helpful addition to users’ online privacy and security, and we’ll continue to add encryption support for more search offerings. To learn more about using the feature, refer to our <a href="//www.google.com/support/websearch/bin/answer.py?answer=173733&hl=en">help article on search over SSL</a>.<br /><br /><span class="byline-author">Posted by Evan Roseman, Software Engineer</span> <span itemprop='author' itemscope='itemscope' itemtype='http://schema.org/Person'> <meta content='https://plus.google.com/116899029375914044550' itemprop='url'/> </span> </script> <noscript> <span style="font-style:italic;"><span><b>Update June 25, 2010: </b></span><b><span class="Apple-style-span" style="font-style: normal;">Since we introduced our encrypted search option last month, we’ve been listening closely to user feedback. Many users appreciate the capability to perform searches with better protection against snooping from third parties. We’ve also heard about some challenges faced by various school districts, and today, we want to inform you that we’ve moved encrypted search from <a href="https://www.google.com/">https://www.google.com</a> to <a href="https://encrypted.google.com/">https://encrypted.google.com</a>. The site functions in the same way. For more information on this change, please read on <a href="http://googleenterprise.blogspot.com/2010/06/update-on-encrypted-web-search-in.html">here</a>.</span></b></span><br /><br />As people spend more time on the Internet, they want greater control over who has access to their online communications. Many Internet services use what are known as Secure Sockets Layer (SSL) connections to encrypt information that travels between your computer and their service. Usually recognized by a web address starting with “https” or a browser lock icon, this technology is regularly used by online banking sites and e-commerce websites. Other sites may also implement SSL in a more limited fashion, for example, to help protect your passwords when you enter your login information.<br /><br />Years ago Google added SSL encryption to products ranging from Gmail to Google Docs and others, and we continue to enable encryption on more services. Like banking and e-commerce sites, Google’s encryption extends beyond login passwords to the entire service. This session-wide encryption is a significant privacy advantage over systems that only encrypt login pages and credit card information. Early this year, we took an important step forward by making SSL the <a href="http://gmailblog.blogspot.com/2010/01/default-https-access-for-gmail.html">default setting for all Gmail users</a>. And today we’re gradually rolling out a new choice to search more securely at <a href="https://www.google.com/">https://www.google.com</a>.<br /><br />When you search on <a href="https://www.google.com/">https://www.google.com</a>, an encrypted connection is created between your browser and Google. This secured channel helps protect your search terms and your search results pages from being intercepted by a third party on your network. The service includes a modified logo to help indicate that you’re searching using SSL and that you may encounter a somewhat different Google search experience, but as always, remember to check the start of the address bar for “https” and your browser lock indicators:<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgv7r4sUE9RFCHR4f6Th7Fxqqflj7U4KJfXazV0avpGhp53WontYM2DkOUq_wBsokIsO_JK_3iCJ8bS4dJAWPmVHqXMd50WmwQooDWwD0DktoWniXfiiV40EIyfsuM8Wf8BEAYU/s1600/ssl+search.png"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5473790372835637890" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgv7r4sUE9RFCHR4f6Th7Fxqqflj7U4KJfXazV0avpGhp53WontYM2DkOUq_wBsokIsO_JK_3iCJ8bS4dJAWPmVHqXMd50WmwQooDWwD0DktoWniXfiiV40EIyfsuM8Wf8BEAYU/s400/ssl+search.png" style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 129px;" /></a>Today’s release comes with a “beta” label for a few reasons. First, it currently covers only the core Google web search product. To help avoid misunderstanding, when you search using SSL, you won’t see links to offerings like Image Search and Maps that, for the most part, don’t support SSL at this time. Also, since SSL connections require additional time to set up the encryption between your browser and the remote web server, your experience with search over SSL might be slightly slower than your regular Google search experience. What won’t change is that you will still get the same great search results.<br /><br />A few notes to remember: Google will still <a href="//www.google.com/privacy_faq.html#toc-store">maintain search data</a> to improve your search quality and to provide better service. Searching over SSL doesn’t reduce the data sent to Google — it only hides that data from third parties who seek it. And clicking on any of the web results, including Google universal search results for unsupported services like Google Images, could take you out of SSL mode. Our hope is that more websites and services will add support for SSL to help create a better and more consistent experience for you.<br /><br />We think users will appreciate this new option for searching. It’s a helpful addition to users’ online privacy and security, and we’ll continue to add encryption support for more search offerings. To learn more about using the feature, refer to our <a href="//www.google.com/support/websearch/bin/answer.py?answer=173733&hl=en">help article on search over SSL</a>.<br /><br /><span class="byline-author">Posted by Evan Roseman, Software Engineer</span> <span itemprop='author' itemscope='itemscope' itemtype='http://schema.org/Person'> <meta content='https://plus.google.com/116899029375914044550' itemprop='url'/> </span> </noscript> </div> </div> <div class='share'> <span class='gplus-share social-wrapper' data-href='https://plus.google.com/share?url=https://googleblog.blogspot.com/2010/05/search-more-securely-with-encrypted.html'> <img alt='Share on Google+' height='24' src='https://www.gstatic.com/images/branding/google_plus/2x/ic_w_post_gplus_black_24dp.png' width='24'/> </span> <span class='twitter-custom social-wrapper' data-href='http://twitter.com/share?text=Official Google Blog:Search more securely with encrypted Google web search&url=https://googleblog.blogspot.com/2010/05/search-more-securely-with-encrypted.html&via=google'> <img alt='Share on Twitter' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_twitter_black_24dp.png' width='24'/> </span> <span class='fb-custom social-wrapper' data-href='https://www.facebook.com/sharer.php?u=https://googleblog.blogspot.com/2010/05/search-more-securely-with-encrypted.html'> <img alt='Share on Facebook' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_facebook_black_24dp.png' width='24'/> </span> </div> <div class='post-footer'> <div class='cmt_iframe_holder' data-href='https://googleblog.blogspot.com/2010/05/search-more-securely-with-encrypted.html' data-viewtype='FILTERED_POSTMOD'></div> <a href='https://plus.google.com/112374322230920073195' rel='author' style='display:none;'> Google </a> <div class='label-footer'> <span class='labels-caption'> Labels: </span> <span class='labels'> <a class='label' href='https://googleblog.blogspot.com/search/label/search' rel='tag'> search </a> , <a class='label' href='https://googleblog.blogspot.com/search/label/security' rel='tag'> security </a> </span> </div> </div> </div> <div class='post' data-id='5931313960264933422' itemscope='' itemtype='http://schema.org/BlogPosting'> <h2 class='title' itemprop='name'> <a href='https://googleblog.blogspot.com/2010/05/wifi-data-collection-update.html' itemprop='url' title='WiFi data collection: An update'> WiFi data collection: An update </a> </h2> <div class='post-header'> <div class='published'> <span class='publishdate' itemprop='datePublished'> May 14, 2010 </span> </div> </div> <div class='post-body'> <div class='post-content' itemprop='articleBody'> <script type='text/template'> <div style="color: red;"><b>Update June 9, 2010: </b><br /> <br /> <b><span style="color: black;">When we announced three weeks ago that we had mistakenly included code in our software that collected samples of payload data from WiFi networks, we said we would ask a third party to review the software at issue, how it worked, and what data it gathered. That report, by the security consulting firm</span> <a href="http://www.strozfriedberg.com/">Stroz Friedberg</a><span style="color: black;">, is now complete and was sent to the interested data protection authorities today. In short, it confirms that Google did indeed collect and store payload data from unencrypted WiFi networks, but not from networks that were encrypted. You can read the report</span> <a href="//www.google.com/googleblogs/pdfs/friedberg_sourcecode_analysis_060910.pdf">here</a><span style="color: black;">. We are continuing to work with the relevant authorities to respond to their questions and concerns.</span></b><br /> <br /> <b>Update May 17, 2010:</b></div><br /> <b>On Friday May 14 the Irish Data Protection Authority asked us to delete the payload data we collected in error in Ireland. We can confirm that all data identified as being from Ireland was deleted over the weekend in the presence of an independent third party. We are reaching out to Data Protection Authorities in the other relevant countries about how to dispose of the remaining data as quickly as possible.</b><br /> <b><br /> </b><br /> <b>You can read the letter from the independent third party, confirming deletion, <a href="//www.google.com/press/pdf/ISEC_Letter.pdf">here</a>. </b><br /> <i><br /> </i><br /> <i>[original post]</i><br /> Nine days ago the data protection authority (DPA) in Hamburg, Germany asked to audit the WiFi data that our Street View cars collect for use in location-based products like Google Maps for mobile, which enables people to find local restaurants or get directions. His request prompted us to re-examine everything we have been collecting, and during our review we discovered that a statement made in a <a href="http://googlepolicyeurope.blogspot.com/2010/04/data-collected-by-google-cars.html">blog post</a> on April 27 was incorrect. <br /> <br /> In that blog post, and in a technical note sent to data protection authorities the same day, we said that while Google did collect publicly broadcast SSID information (the WiFi network name) and MAC addresses (the unique number given to a device like a WiFi router) using Street View cars, we did not collect payload data (information sent over the network). But it’s now clear that we have been mistakenly collecting samples of payload data from open (i.e. non-password-protected) WiFi networks, even though we never used that data in any Google products. <br /> <br /> However, we will typically have collected only fragments of payload data because: our cars are on the move; someone would need to be using the network as a car passed by; and our in-car WiFi equipment automatically changes channels roughly five times a second. In addition, we did not collect information traveling over secure, password-protected WiFi networks. <br /> <br /> So how did this happen? Quite simply, it was a mistake. In 2006 an engineer working on an experimental WiFi project wrote a piece of code that sampled all categories of publicly broadcast WiFi data. A year later, when our mobile team started a project to collect basic WiFi network data like SSID information and MAC addresses using Google’s Street View cars, they included that code in their software—although the project leaders did not want, and had no intention of using, payload data. <br /> <br /> As soon as we became aware of this problem, we grounded our Street View cars and segregated the data on our network, which we then disconnected to make it inaccessible. We want to delete this data as soon as possible, and are currently reaching out to regulators in the relevant countries about how to quickly dispose of it.<br /> <br /> Maintaining people’s trust is crucial to everything we do, and in this case we fell short. So we will be:<br /> <ul><li>Asking a third party to review the software at issue, how it worked and what data it gathered, as well as to confirm that we deleted the data appropriately; and</li> <li>Internally reviewing our procedures to ensure that our controls are sufficiently robust to address these kinds of problems in the future.</li> </ul>In addition, given the concerns raised, we have decided that it’s best to stop our Street View cars collecting WiFi network data entirely. <br /> <br /> This incident highlights just how publicly accessible open, non-password-protected WiFi networks are today. Earlier this year, we encrypted Gmail for all our users, and next week we will start offering an encrypted version of Google Search. For other services users can check that pages are encrypted by looking to see whether the URL begins with “https”, rather than just “http”; browsers will generally show a lock icon when the connection is secure. For more information about how to password-protect your network, <a href="https://ssd.eff.org/tech/wifi">read this</a>.<br /> <br /> The engineering team at Google works hard to earn your trust—and we are acutely aware that we failed badly here. We are profoundly sorry for this error and are determined to learn all the lessons we can from our mistake.<br /> <br /> <span class="byline-author">Posted by Alan Eustace, Senior VP, Engineering & Research</span> <span itemprop='author' itemscope='itemscope' itemtype='http://schema.org/Person'> <meta content='https://plus.google.com/116899029375914044550' itemprop='url'/> </span> </script> <noscript> <div style="color: red;"><b>Update June 9, 2010: </b><br /> <br /> <b><span style="color: black;">When we announced three weeks ago that we had mistakenly included code in our software that collected samples of payload data from WiFi networks, we said we would ask a third party to review the software at issue, how it worked, and what data it gathered. That report, by the security consulting firm</span> <a href="http://www.strozfriedberg.com/">Stroz Friedberg</a><span style="color: black;">, is now complete and was sent to the interested data protection authorities today. In short, it confirms that Google did indeed collect and store payload data from unencrypted WiFi networks, but not from networks that were encrypted. You can read the report</span> <a href="//www.google.com/googleblogs/pdfs/friedberg_sourcecode_analysis_060910.pdf">here</a><span style="color: black;">. We are continuing to work with the relevant authorities to respond to their questions and concerns.</span></b><br /> <br /> <b>Update May 17, 2010:</b></div><br /> <b>On Friday May 14 the Irish Data Protection Authority asked us to delete the payload data we collected in error in Ireland. We can confirm that all data identified as being from Ireland was deleted over the weekend in the presence of an independent third party. We are reaching out to Data Protection Authorities in the other relevant countries about how to dispose of the remaining data as quickly as possible.</b><br /> <b><br /> </b><br /> <b>You can read the letter from the independent third party, confirming deletion, <a href="//www.google.com/press/pdf/ISEC_Letter.pdf">here</a>. </b><br /> <i><br /> </i><br /> <i>[original post]</i><br /> Nine days ago the data protection authority (DPA) in Hamburg, Germany asked to audit the WiFi data that our Street View cars collect for use in location-based products like Google Maps for mobile, which enables people to find local restaurants or get directions. His request prompted us to re-examine everything we have been collecting, and during our review we discovered that a statement made in a <a href="http://googlepolicyeurope.blogspot.com/2010/04/data-collected-by-google-cars.html">blog post</a> on April 27 was incorrect. <br /> <br /> In that blog post, and in a technical note sent to data protection authorities the same day, we said that while Google did collect publicly broadcast SSID information (the WiFi network name) and MAC addresses (the unique number given to a device like a WiFi router) using Street View cars, we did not collect payload data (information sent over the network). But it’s now clear that we have been mistakenly collecting samples of payload data from open (i.e. non-password-protected) WiFi networks, even though we never used that data in any Google products. <br /> <br /> However, we will typically have collected only fragments of payload data because: our cars are on the move; someone would need to be using the network as a car passed by; and our in-car WiFi equipment automatically changes channels roughly five times a second. In addition, we did not collect information traveling over secure, password-protected WiFi networks. <br /> <br /> So how did this happen? Quite simply, it was a mistake. In 2006 an engineer working on an experimental WiFi project wrote a piece of code that sampled all categories of publicly broadcast WiFi data. A year later, when our mobile team started a project to collect basic WiFi network data like SSID information and MAC addresses using Google’s Street View cars, they included that code in their software—although the project leaders did not want, and had no intention of using, payload data. <br /> <br /> As soon as we became aware of this problem, we grounded our Street View cars and segregated the data on our network, which we then disconnected to make it inaccessible. We want to delete this data as soon as possible, and are currently reaching out to regulators in the relevant countries about how to quickly dispose of it.<br /> <br /> Maintaining people’s trust is crucial to everything we do, and in this case we fell short. So we will be:<br /> <ul><li>Asking a third party to review the software at issue, how it worked and what data it gathered, as well as to confirm that we deleted the data appropriately; and</li> <li>Internally reviewing our procedures to ensure that our controls are sufficiently robust to address these kinds of problems in the future.</li> </ul>In addition, given the concerns raised, we have decided that it’s best to stop our Street View cars collecting WiFi network data entirely. <br /> <br /> This incident highlights just how publicly accessible open, non-password-protected WiFi networks are today. Earlier this year, we encrypted Gmail for all our users, and next week we will start offering an encrypted version of Google Search. For other services users can check that pages are encrypted by looking to see whether the URL begins with “https”, rather than just “http”; browsers will generally show a lock icon when the connection is secure. For more information about how to password-protect your network, <a href="https://ssd.eff.org/tech/wifi">read this</a>.<br /> <br /> The engineering team at Google works hard to earn your trust—and we are acutely aware that we failed badly here. We are profoundly sorry for this error and are determined to learn all the lessons we can from our mistake.<br /> <br /> <span class="byline-author">Posted by Alan Eustace, Senior VP, Engineering & Research</span> <span itemprop='author' itemscope='itemscope' itemtype='http://schema.org/Person'> <meta content='https://plus.google.com/116899029375914044550' itemprop='url'/> </span> </noscript> </div> </div> <div class='share'> <span class='gplus-share social-wrapper' data-href='https://plus.google.com/share?url=https://googleblog.blogspot.com/2010/05/wifi-data-collection-update.html'> <img alt='Share on Google+' height='24' src='https://www.gstatic.com/images/branding/google_plus/2x/ic_w_post_gplus_black_24dp.png' width='24'/> </span> <span class='twitter-custom social-wrapper' data-href='http://twitter.com/share?text=Official Google Blog:WiFi data collection: An update&url=https://googleblog.blogspot.com/2010/05/wifi-data-collection-update.html&via=google'> <img alt='Share on Twitter' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_twitter_black_24dp.png' width='24'/> </span> <span class='fb-custom social-wrapper' data-href='https://www.facebook.com/sharer.php?u=https://googleblog.blogspot.com/2010/05/wifi-data-collection-update.html'> <img alt='Share on Facebook' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_facebook_black_24dp.png' width='24'/> </span> </div> <div class='post-footer'> <div class='cmt_iframe_holder' data-href='https://googleblog.blogspot.com/2010/05/wifi-data-collection-update.html' data-viewtype='FILTERED_POSTMOD'></div> <a href='https://plus.google.com/112374322230920073195' rel='author' style='display:none;'> Google </a> <div class='label-footer'> <span class='labels-caption'> Labels: </span> <span class='labels'> <a class='label' href='https://googleblog.blogspot.com/search/label/privacy' rel='tag'> privacy </a> , <a class='label' href='https://googleblog.blogspot.com/search/label/security' rel='tag'> security </a> </span> </div> </div> </div> <div class='blog-pager' id='blog-pager'> <a class='home-link' href='https://googleblog.blogspot.com/'> <i class='material-icons'>  </i> </a> <i class='material-icons disabled'>  </i> <span id='blog-pager-older-link'> <a class='blog-pager-older-link' href='https://googleblog.blogspot.com/search/label/security?updated-max=2010-05-14T13:44:00-07:00&max-results=20&start=20&by-date=false' id='Blog1_blog-pager-older-link' title='Older Posts'> <i class='material-icons'>  </i> </a> </span> </div> <div class='clear'></div> </div></div> </div> </div> <div class='col-right'> <div class='section' id='sidebar-top'><div class='widget HTML' data-version='1' id='HTML8'> <div class='widget-content'> <div class='searchBox'><input type='text' title='Search This Blog' placeholder='Search blog ...' /></div> </div> <div class='clear'></div> </div></div> <div id='aside'> <div class='section' id='sidebar'><div class='widget Label' data-version='1' id='Label1'> <div class='tab'> <img class='sidebar-icon' src='data:image/png;base64,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'/> <h2> Labels </h2> <i class='material-icons arrow'>  </i> </div> <div class='widget-content list-label-widget-content'> <ul> <li> <a dir='ltr' href='https://googleblog.blogspot.com/search/label/accessibility'> accessibility </a> <span dir='ltr'> 41 </span> </li> <li> <a dir='ltr' href='https://googleblog.blogspot.com/search/label/acquisition'> acquisition </a> <span dir='ltr'> 26 </span> </li> <li> <a dir='ltr' href='https://googleblog.blogspot.com/search/label/ads'> ads </a> <span dir='ltr'> 131 </span> </li> <li> <a dir='ltr' href='https://googleblog.blogspot.com/search/label/Africa'> Africa </a> <span dir='ltr'> 19 </span> </li> <li> <a dir='ltr' href='https://googleblog.blogspot.com/search/label/Android'> Android </a> <span dir='ltr'> 58 </span> </li> <li> <a dir='ltr' href='https://googleblog.blogspot.com/search/label/apps'> apps </a> <span dir='ltr'> 419 </span> </li> <li> <a dir='ltr' href='https://googleblog.blogspot.com/search/label/April%201'> April 1 </a> <span dir='ltr'> 4 </span> </li> <li> <a dir='ltr' href='https://googleblog.blogspot.com/search/label/Asia'> Asia </a> <span dir='ltr'> 39 </span> </li> <li> <a dir='ltr' href='https://googleblog.blogspot.com/search/label/books%20%2B%20book%20search'> books + book search </a> <span dir='ltr'> 48 </span> </li> <li> <a dir='ltr' href='https://googleblog.blogspot.com/search/label/commerce'> commerce </a> <span dir='ltr'> 12 </span> </li> <li> <a dir='ltr' href='https://googleblog.blogspot.com/search/label/computing%20history'> computing history </a> <span dir='ltr'> 7 </span> </li> <li> <a dir='ltr' href='https://googleblog.blogspot.com/search/label/crisis%20response'> crisis response </a> <span dir='ltr'> 33 </span> </li> <li> <a dir='ltr' href='https://googleblog.blogspot.com/search/label/culture'> culture </a> <span dir='ltr'> 12 </span> </li> <li> <a dir='ltr' href='https://googleblog.blogspot.com/search/label/developers'> developers </a> <span dir='ltr'> 120 </span> </li> <li> <a dir='ltr' href='https://googleblog.blogspot.com/search/label/diversity'> diversity </a> <span dir='ltr'> 35 </span> </li> <li> <a dir='ltr' href='https://googleblog.blogspot.com/search/label/doodles'> doodles </a> <span dir='ltr'> 68 </span> </li> <li> <a dir='ltr' href='https://googleblog.blogspot.com/search/label/education%20and%20research'> education and research </a> <span dir='ltr'> 144 </span> </li> <li> <a dir='ltr' href='https://googleblog.blogspot.com/search/label/entrepreneurs%20at%20Google'> entrepreneurs at Google </a> <span dir='ltr'> 14 </span> </li> <li> <a dir='ltr' href='https://googleblog.blogspot.com/search/label/Europe'> Europe </a> <span dir='ltr'> 46 </span> </li> <li> <a dir='ltr' href='https://googleblog.blogspot.com/search/label/faster%20web'> faster web </a> <span dir='ltr'> 16 </span> </li> <li> <a dir='ltr' href='https://googleblog.blogspot.com/search/label/free%20expression'> free expression </a> <span dir='ltr'> 61 </span> </li> <li> <a dir='ltr' href='https://googleblog.blogspot.com/search/label/google.org'> google.org </a> <span dir='ltr'> 73 </span> </li> <li> <a dir='ltr' href='https://googleblog.blogspot.com/search/label/googleplus'> googleplus </a> <span dir='ltr'> 50 </span> </li> <li> <a dir='ltr' href='https://googleblog.blogspot.com/search/label/googlers%20and%20culture'> googlers and culture </a> <span dir='ltr'> 202 </span> </li> <li> <a dir='ltr' href='https://googleblog.blogspot.com/search/label/green'> green </a> <span dir='ltr'> 102 </span> </li> <li> <a dir='ltr' href='https://googleblog.blogspot.com/search/label/Latin%20America'> Latin America </a> <span dir='ltr'> 18 </span> </li> <li> <a dir='ltr' href='https://googleblog.blogspot.com/search/label/maps%20and%20earth'> maps and earth </a> <span dir='ltr'> 194 </span> </li> <li> <a dir='ltr' href='https://googleblog.blogspot.com/search/label/mobile'> mobile </a> <span dir='ltr'> 124 </span> </li> <li> <a dir='ltr' href='https://googleblog.blogspot.com/search/label/online%20safety'> online safety </a> <span dir='ltr'> 19 </span> </li> <li> <a dir='ltr' href='https://googleblog.blogspot.com/search/label/open%20source'> open source </a> <span dir='ltr'> 19 </span> </li> <li> <a dir='ltr' href='https://googleblog.blogspot.com/search/label/photos'> photos </a> <span dir='ltr'> 39 </span> </li> <li> <a dir='ltr' href='https://googleblog.blogspot.com/search/label/policy%20and%20issues'> policy and issues </a> <span dir='ltr'> 139 </span> </li> <li> <a dir='ltr' href='https://googleblog.blogspot.com/search/label/politics'> politics </a> <span dir='ltr'> 71 </span> </li> <li> <a dir='ltr' href='https://googleblog.blogspot.com/search/label/privacy'> privacy </a> <span dir='ltr'> 66 </span> </li> <li> <a dir='ltr' href='https://googleblog.blogspot.com/search/label/recruiting%20and%20hiring'> recruiting and hiring </a> <span dir='ltr'> 32 </span> </li> <li> <a dir='ltr' href='https://googleblog.blogspot.com/search/label/scholarships'> scholarships </a> <span dir='ltr'> 31 </span> </li> <li> <a dir='ltr' href='https://googleblog.blogspot.com/search/label/search'> search </a> <span dir='ltr'> 505 </span> </li> <li> <a dir='ltr' href='https://googleblog.blogspot.com/search/label/search%20quality'> search quality </a> <span dir='ltr'> 24 </span> </li> <li> <a dir='ltr' href='https://googleblog.blogspot.com/search/label/search%20trends'> search trends </a> <span dir='ltr'> 118 </span> </li> <li> <span dir='ltr'> security </span> <span dir='ltr'> 36 </span> </li> <li> <a dir='ltr' href='https://googleblog.blogspot.com/search/label/small%20business'> small business </a> <span dir='ltr'> 31 </span> </li> <li> <a dir='ltr' href='https://googleblog.blogspot.com/search/label/user%20experience%20and%20usability'> user experience and usability </a> <span dir='ltr'> 41 </span> </li> <li> <a dir='ltr' href='https://googleblog.blogspot.com/search/label/youtube%20and%20video'> youtube and video </a> <span dir='ltr'> 140 </span> </li> </ul> <div class='clear'></div> </div> </div><div class='widget BlogArchive' data-version='1' id='BlogArchive1'> <div class='tab'> <i class='material-icons icon'>  </i> <h2> Archive </h2> <i class='material-icons arrow'>  </i> </div> <div class='widget-content'> <div id='ArchiveList'> <div id='BlogArchive1_ArchiveList'> <ul class='hierarchy'> <li class='archivedate expanded'> <div class='intervalToggle'> <span class='new-toggle' href='javascript:void(0)'> <i class='material-icons arrow'>  </i> </span> <a class='toggle' href='javascript:void(0)' style='display: none'> <span class='zippy toggle-open'> <i class='material-icons'>  </i>   </span> </a> <a class='post-count-link' href='https://googleblog.blogspot.com/2016/'> 2016 </a> </div> <div class='items'> <ul class='hierarchy'> <li class='archivedate expanded'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2016/11/'> Nov </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2016/10/'> Oct </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2016/09/'> Sep </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2016/08/'> Aug </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2016/07/'> Jul </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2016/06/'> Jun </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2016/05/'> May </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2016/04/'> Apr </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2016/03/'> Mar </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2016/02/'> Feb </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2016/01/'> Jan </a> </div> <div class='items'> </div> </li> </ul> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class='intervalToggle'> <span class='new-toggle' href='javascript:void(0)'> <i class='material-icons arrow'>  </i> </span> <a class='toggle' href='javascript:void(0)' style='display: none'> <span class='zippy'> <i class='material-icons'>  </i>   </span> </a> <a class='post-count-link' href='https://googleblog.blogspot.com/2015/'> 2015 </a> </div> <div class='items'> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2015/12/'> Dec </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2015/11/'> Nov </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2015/10/'> Oct </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2015/09/'> Sep </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2015/08/'> Aug </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2015/07/'> Jul </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2015/06/'> Jun </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2015/05/'> May </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2015/04/'> Apr </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2015/03/'> Mar </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2015/02/'> Feb </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2015/01/'> Jan </a> </div> <div class='items'> </div> </li> </ul> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class='intervalToggle'> <span class='new-toggle' href='javascript:void(0)'> <i class='material-icons arrow'>  </i> </span> <a class='toggle' href='javascript:void(0)' style='display: none'> <span class='zippy'> <i class='material-icons'>  </i>   </span> </a> <a class='post-count-link' href='https://googleblog.blogspot.com/2014/'> 2014 </a> </div> <div class='items'> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2014/12/'> Dec </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2014/11/'> Nov </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2014/10/'> Oct </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2014/09/'> Sep </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2014/08/'> Aug </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2014/07/'> Jul </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2014/06/'> Jun </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2014/05/'> May </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2014/04/'> Apr </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2014/03/'> Mar </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2014/02/'> Feb </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2014/01/'> Jan </a> </div> <div class='items'> </div> </li> </ul> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class='intervalToggle'> <span class='new-toggle' href='javascript:void(0)'> <i class='material-icons arrow'>  </i> </span> <a class='toggle' href='javascript:void(0)' style='display: none'> <span class='zippy'> <i class='material-icons'>  </i>   </span> </a> <a class='post-count-link' href='https://googleblog.blogspot.com/2013/'> 2013 </a> </div> <div class='items'> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2013/12/'> Dec </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2013/11/'> Nov </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2013/10/'> Oct </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2013/09/'> Sep </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2013/08/'> Aug </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2013/07/'> Jul </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2013/06/'> Jun </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2013/05/'> May </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2013/04/'> Apr </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2013/03/'> Mar </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2013/02/'> Feb </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2013/01/'> Jan </a> </div> <div class='items'> </div> </li> </ul> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class='intervalToggle'> <span class='new-toggle' href='javascript:void(0)'> <i class='material-icons arrow'>  </i> </span> <a class='toggle' href='javascript:void(0)' style='display: none'> <span class='zippy'> <i class='material-icons'>  </i>   </span> </a> <a class='post-count-link' href='https://googleblog.blogspot.com/2012/'> 2012 </a> </div> <div class='items'> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2012/12/'> Dec </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2012/11/'> Nov </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2012/10/'> Oct </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2012/09/'> Sep </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2012/08/'> Aug </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2012/07/'> Jul </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2012/06/'> Jun </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2012/05/'> May </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2012/04/'> Apr </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2012/03/'> Mar </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2012/02/'> Feb </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2012/01/'> Jan </a> </div> <div class='items'> </div> </li> </ul> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class='intervalToggle'> <span class='new-toggle' href='javascript:void(0)'> <i class='material-icons arrow'>  </i> </span> <a class='toggle' href='javascript:void(0)' style='display: none'> <span class='zippy'> <i class='material-icons'>  </i>   </span> </a> <a class='post-count-link' href='https://googleblog.blogspot.com/2011/'> 2011 </a> </div> <div class='items'> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2011/12/'> Dec </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2011/11/'> Nov </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2011/10/'> Oct </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2011/09/'> Sep </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2011/08/'> Aug </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2011/07/'> Jul </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2011/06/'> Jun </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2011/05/'> May </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2011/04/'> Apr </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2011/03/'> Mar </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2011/02/'> Feb </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2011/01/'> Jan </a> </div> <div class='items'> </div> </li> </ul> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class='intervalToggle'> <span class='new-toggle' href='javascript:void(0)'> <i class='material-icons arrow'>  </i> </span> <a class='toggle' href='javascript:void(0)' style='display: none'> <span class='zippy'> <i class='material-icons'>  </i>   </span> </a> <a class='post-count-link' href='https://googleblog.blogspot.com/2010/'> 2010 </a> </div> <div class='items'> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2010/12/'> Dec </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2010/11/'> Nov </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2010/10/'> Oct </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2010/09/'> Sep </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2010/08/'> Aug </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2010/07/'> Jul </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2010/06/'> Jun </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2010/05/'> May </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2010/04/'> Apr </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2010/03/'> Mar </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2010/02/'> Feb </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2010/01/'> Jan </a> </div> <div class='items'> </div> </li> </ul> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class='intervalToggle'> <span class='new-toggle' href='javascript:void(0)'> <i class='material-icons arrow'>  </i> </span> <a class='toggle' href='javascript:void(0)' style='display: none'> <span class='zippy'> <i class='material-icons'>  </i>   </span> </a> <a class='post-count-link' href='https://googleblog.blogspot.com/2009/'> 2009 </a> </div> <div class='items'> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2009/12/'> Dec </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2009/11/'> Nov </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2009/10/'> Oct </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2009/09/'> Sep </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2009/08/'> Aug </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2009/07/'> Jul </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2009/06/'> Jun </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2009/05/'> May </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2009/04/'> Apr </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2009/03/'> Mar </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2009/02/'> Feb </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2009/01/'> Jan </a> </div> <div class='items'> </div> </li> </ul> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class='intervalToggle'> <span class='new-toggle' href='javascript:void(0)'> <i class='material-icons arrow'>  </i> </span> <a class='toggle' href='javascript:void(0)' style='display: none'> <span class='zippy'> <i class='material-icons'>  </i>   </span> </a> <a class='post-count-link' href='https://googleblog.blogspot.com/2008/'> 2008 </a> </div> <div class='items'> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2008/12/'> Dec </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2008/11/'> Nov </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2008/10/'> Oct </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2008/09/'> Sep </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2008/08/'> Aug </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2008/07/'> Jul </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2008/06/'> Jun </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2008/05/'> May </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2008/04/'> Apr </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2008/03/'> Mar </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2008/02/'> Feb </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2008/01/'> Jan </a> </div> <div class='items'> </div> </li> </ul> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class='intervalToggle'> <span class='new-toggle' href='javascript:void(0)'> <i class='material-icons arrow'>  </i> </span> <a class='toggle' href='javascript:void(0)' style='display: none'> <span class='zippy'> <i class='material-icons'>  </i>   </span> </a> <a class='post-count-link' href='https://googleblog.blogspot.com/2007/'> 2007 </a> </div> <div class='items'> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2007/12/'> Dec </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2007/11/'> Nov </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2007/10/'> Oct </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2007/09/'> Sep </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2007/08/'> Aug </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2007/07/'> Jul </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2007/06/'> Jun </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2007/05/'> May </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2007/04/'> Apr </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2007/03/'> Mar </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2007/02/'> Feb </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2007/01/'> Jan </a> </div> <div class='items'> </div> </li> </ul> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class='intervalToggle'> <span class='new-toggle' href='javascript:void(0)'> <i class='material-icons arrow'>  </i> </span> <a class='toggle' href='javascript:void(0)' style='display: none'> <span class='zippy'> <i class='material-icons'>  </i>   </span> </a> <a class='post-count-link' href='https://googleblog.blogspot.com/2006/'> 2006 </a> </div> <div class='items'> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2006/12/'> Dec </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2006/11/'> Nov </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2006/10/'> Oct </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2006/09/'> Sep </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2006/08/'> Aug </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2006/07/'> Jul </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2006/06/'> Jun </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2006/05/'> May </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2006/04/'> Apr </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2006/03/'> Mar </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2006/02/'> Feb </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2006/01/'> Jan </a> </div> <div class='items'> </div> </li> </ul> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class='intervalToggle'> <span class='new-toggle' href='javascript:void(0)'> <i class='material-icons arrow'>  </i> </span> <a class='toggle' href='javascript:void(0)' style='display: none'> <span class='zippy'> <i class='material-icons'>  </i>   </span> </a> <a class='post-count-link' href='https://googleblog.blogspot.com/2005/'> 2005 </a> </div> <div class='items'> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2005/12/'> Dec </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2005/11/'> Nov </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2005/10/'> Oct </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2005/09/'> Sep </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2005/08/'> Aug </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2005/07/'> Jul </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2005/06/'> Jun </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2005/05/'> May </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2005/04/'> Apr </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2005/03/'> Mar </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2005/02/'> Feb </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2005/01/'> Jan </a> </div> <div class='items'> </div> </li> </ul> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class='intervalToggle'> <span class='new-toggle' href='javascript:void(0)'> <i class='material-icons arrow'>  </i> </span> <a class='toggle' href='javascript:void(0)' style='display: none'> <span class='zippy'> <i class='material-icons'>  </i>   </span> </a> <a class='post-count-link' href='https://googleblog.blogspot.com/2004/'> 2004 </a> </div> <div class='items'> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2004/12/'> Dec </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2004/11/'> Nov </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2004/10/'> Oct </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2004/09/'> Sep </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2004/08/'> Aug </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2004/07/'> Jul </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2004/06/'> Jun </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2004/05/'> May </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://googleblog.blogspot.com/2004/04/'> Apr </a> </div> <div class='items'> </div> </li> </ul> </div> </li> </ul> </div> </div> <div class='clear'></div> </div> </div><div class='widget HTML' data-version='1' id='HTML6'> <div class='widget-content'> <a href="http://googleblog.blogspot.com/atom.xml"> <img src="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAADAAAAAwCAYAAABXAvmHAAAAGXRFWHRTb2Z0d2FyZQBBZG9iZSBJbWFnZVJlYWR5ccllPAAAAihJREFUeNrsWa9Pw0AU7viRMDFRBAkzJDMIBIhJJhCzk7NILIqMv4AEhdz+BCY3OYssAlGBoAJREpZwAlHEBO8lr8nSvNeVbu1dyX3JlzTrXfa+u/e9d7c5joWFhYVO1Fa8PwH2gK6m+BRwAvSlAdsrgr8E1jUuMH73GTAEzrkBWymTewZlihhLmgDXIAFuHgGVQOUF7OSYM1p6PgTuA1vAZlUEvAnPdapcMY0VICECekQ0XRfYrqoHsAGNgXfAoMomRiFDEhOZkkL3S88hMaB2LwXp0bj+ps2edpToZpjfoIDQtBeU+xjoDzP2G/gCPKZ5f8WsCAFJoJgOCcFdWSTeL9YQMSvTA1h9BkI5jaiXhLpSCL/8mVZY0UpyJ9ZdOkniu1dmJ96BpzQu9w6s28gcOq9j6pwLdR8/36NK5CQKwJSMrb2MhhSglBpt4UjsrdsnNu0B3J0HCozbCc4TjyY2srEgos/4RQljCzNxl4ireQD8FOq+T+W0mTB2g7njhlR+Sy2jsXFvU658U8YTbeaGpdIu7mWkEAq5ZtIjIhFZdtfX7QHckSvB2B6zC3VdAkZk0kAQwaXTk/CzTXK3wjIExCs6ZJpTnE4uY1KV+KzFzA3KTiFPENHJkOPcsfpLhwe4btoSuvUqAR+6TOxlCE6ZfKUsJLgsqGW8OpqAGx2X+sLxrwUog+JUeQRMDBIwyXOcnlPtPnL0/UsT/8LnOxYWFhZG4leAAQAAQHEaYuzHbAAAAABJRU5ErkJggg==" class="sidebar-icon" /> <h2>Feed</h2> </a> </div> <div class='clear'></div> </div></div> <div class='section' id='sidebar-bottom'><div class='widget HTML' data-version='1' id='HTML5'> <div class='widget-content'> <div class="followgooglewrapper"> <a href="https://plus.google.com/+google" rel="publisher" style="text-decoration:none;display:inline-block;color:#333;text-align:center; font:13px/16px arial,sans-serif;white-space:nowrap;"> <span style="display:inline-block;font-weight:bold;vertical-align:top;margin-right:5px; margin-top:0px;">Google</span><span style="display:inline-block;vertical-align:top;margin-right:13px; margin-top:0px;">on</span> <img src="//ssl.gstatic.com/images/icons/gplus-16.png" alt="Google+" style="border:0;width:16px;height:16px;"/></a> </div> <div class='followgooglewrapper'> <script src="https://apis.google.com/js/plusone.js"></script> <div class="g-ytsubscribe" data-channel="Google" data-layout="default"></div> </div> <div class="share followgooglewrapper"> <button data-href="https://twitter.com/intent/follow?original_referer=http://googleblog.blogspot.com/&screen_name=google" onclick='sharingPopup(this);' id='twitter-share'><span class="twitter-follow">Follow @google</span></button> <script> function sharingPopup (button) { var url = button.getAttribute("data-href"); window.open( url,'popUpWindow','height=500,width=500,left=10,top=10,resizable=yes,scrollbars=yes,toolbar=yes,menubar=no,location=no,directories=no,status=yes'); } </script> </div> <!-- Facebook --> <div class="fb-follow-button"> <a href="https://www.facebook.com/google" target="_blank"><img class="fb-follow" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgoPDgpnJSLm_h0QB9lJTCDnBDrjiGzSZbejjj1WyplhO34Rk92e2Q8JPubqxhTADvPVxcjSLhgJPENyAWZ2ju2MoTO7kXkCsKLCMUJ67g1KWG3T83KsTG_MVGY1L6ANk5v2Bn3Xw/s1600/facebook-logo.png" />Follow</a> </div> <!-- Instagram --> <style>.ig-b- { display: inline-block; } .ig-b- img { visibility: hidden; } .ig-b-:hover { background-position: 0 -60px; } .ig-b-:active { background-position: 0 -120px; } .ig-b-v-24 { width: 137px; height: 24px; background: url(//badges.instagram.com/static/images/ig-badge-view-sprite-24.png) no-repeat 0 0; } @media only screen and (-webkit-min-device-pixel-ratio: 2), only screen and (min--moz-device-pixel-ratio: 2), only screen and (-o-min-device-pixel-ratio: 2 / 1), only screen and (min-device-pixel-ratio: 2), only screen and (min-resolution: 192dpi), only screen and (min-resolution: 2dppx) { .ig-b-v-24 { background-image: url(//badges.instagram.com/static/images/ig-badge-view-sprite-24@2x.png); background-size: 160px 178px; } }</style> <div class="followgooglewrapper"> <a href="http://instagram.com/google?ref=badge" class="ig-b- ig-b-v-24" target="_blank"><img src="//badges.instagram.com/static/images/ig-badge-view-24.png" alt="Instagram" /></a> </div> </div> <div class='clear'></div> </div><div class='widget HTML' data-version='1' id='HTML1'> <div class='widget-content'> <div class="text"> Give us feedback in our <br /> <a href="http://support.google.com/bin/static.py?hl=en&page=portal_groups.cs">Product Forums</a>. </div> </div> <div class='clear'></div> </div></div> </div> </div> <div style='clear:both;'></div> </div> <!-- Footer --> <div class='footer-outer loading'> <div class='footer-inner'> <div class='footer-inner-2'> <div style='width:33%;float:left;'> <div class='section' id='footer-1'><div class='widget HTML' data-version='1' id='HTML2'> <h2 class='title'> Company-wide </h2> <div class='widget-content'> <ul> <li> <a href="//googlepublicpolicy.blogspot.com/" title="Public Policy">Public Policy Blog</a> </li> <li> <a href="//googleresearch.blogspot.com/" title="Research">Research Blog</a> </li> <li> <a href="//googleforstudents.blogspot.com/" title="Student">Student Blog</a> </li> </ul> </div> <div class='clear'></div> </div></div> </div> <div style='width:33%;float:left;'> <div class='section' id='footer-2'><div class='widget HTML' data-version='1' id='HTML3'> <h2 class='title'> Products </h2> <div class='widget-content'> <ul> <li> <a href="//officialandroid.blogspot.com/" title="Android">Official Android Blog</a> </li> <li> <a href="//chrome.blogspot.com/" title="Chrome">Chrome Blog</a> </li> <li> <a href="//google-latlong.blogspot.com/" title="Lat Long">Lat Long Blog</a> </li> </ul> </div> <div class='clear'></div> </div></div> </div> <div style='width:33%;float:left;'> <div class='section' id='footer-3'><div class='widget HTML' data-version='1' id='HTML4'> <h2 class='title'> Developers </h2> <div class='widget-content'> <ul> <li> <a href="//googledevelopers.blogspot.com/" title="Developers">Developers Blog</a> </li> <li> <a href="//googleadsdeveloper.blogspot.com/" title="Ads Developer">Ads Developer Blog</a> </li> <li> <a href="//android-developers.blogspot.com/" title="Android">Android Developers Blog</a> </li> </ul> </div> <div class='clear'></div> </div></div> </div> <div style='clear:both;'></div> </div> </div> </div> <div class='google-footer-outer loading'> <div id='google-footer'> <a href='//www.google.com/'> <img class='google-logo-dark' height='36' src='data:image/png;base64,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' style='margin-top: -16px;' width='92'/> </a> <ul> <li> <a href='//www.google.com/'> Google </a> </li> <li> <a href='//www.google.com/policies/privacy/'> Privacy </a> </li> <li> <a href='//www.google.com/policies/terms/'> Terms </a> </li> </ul> </div> </div> <script type='text/javascript'> //<![CDATA[ // Social sharing popups. var postEl = document.getElementsByClassName('social-wrapper'); var postCount = postEl.length; for(i=0; i<postCount;i++){ postEl[i].addEventListener("click", function(event){ var postUrl = this.getAttribute("data-href"); window.open( postUrl,'popUpWindow','height=500,width=500,left=10,top=10,resizable=yes,scrollbars=yes,toolbar=yes,menubar=no,location=no,directories=no,status=yes'); });} //]]> </script> <script type='text/javascript'> //<![CDATA[ var BreakpointHandler = function() { this.initted = false; this.isHomePage = false; this.isMobile = false; }; BreakpointHandler.prototype.finalizeSummary = function(summaryHtml, lastNode) { // Use $.trim for IE8 compatibility summaryHtml = $.trim(summaryHtml).replace(/(<br>|\s)+$/,''); if (lastNode.nodeType == 3) { var lastChar = summaryHtml.slice(-1); if (!lastChar.match(/[.”"?]/)) { if (!lastChar.match(/[A-Za-z]/)) { summaryHtml = summaryHtml.slice(0, -1); } summaryHtml += ' ...'; } } else if (lastNode.nodeType == 1 && (lastNode.nodeName == 'I' || lastNode.nodeName == 'A')) { summaryHtml += ' ...'; } return summaryHtml; }; BreakpointHandler.prototype.generateSummaryFromContent = function(content, numWords) { var seenWords = 0; var summaryHtml = ''; for (var i=0; i < content.childNodes.length; i++) { var node = content.childNodes[i]; var nodeText; if (node.nodeType == 1) { if (node.hasAttribute('data-about-pullquote')) { continue; } nodeText = node.textContent; if (nodeText === undefined) { // innerText for IE8 nodeText = node.innerText; } if (node.nodeName == 'DIV' || node.nodeName == 'B') { // Don't end early if we haven't seen enough words. if (seenWords < 10) { continue; } if (i > 0) { summaryHtml = this.finalizeSummary(summaryHtml, content.childNodes[i-1]); } break; } summaryHtml += node.outerHTML; } else if (node.nodeType == 3) { nodeText = node.nodeValue; summaryHtml += nodeText + ' '; } var words = nodeText.match(/\S+\s*/g); if (!words) { continue; } var remain = numWords - seenWords; if (words.length >= remain) { summaryHtml = this.finalizeSummary(summaryHtml, node); break; } seenWords += words.length; } return summaryHtml; }; BreakpointHandler.prototype.detect = function() { var match, pl = /\+/g, search = /([^&=]+)=?([^&]*)/g, decode = function (s) { return decodeURIComponent(s.replace(pl, " ")); }, query = window.location.search.substring(1); var urlParams = {}; while (match = search.exec(query)) urlParams[decode(match[1])] = decode(match[2]); this.isListPage = $('html').hasClass('list-page'); this.isMobile = urlParams['m'] === '1'; this.isHomePage = window.location.pathname == '/'; }; BreakpointHandler.prototype.initContent = function() { var self = this; $('.post').each(function(index) { var body = $(this).children('.post-body')[0]; var content = $(body).children('.post-content')[0]; $(content).addClass('post-original'); var data = $(content).children('script').html(); data = self.rewriteForSSL(data); // If exists, extract specified editor's preview. var match = data.match(/([\s\S]+?)<div data-is-preview.+?>([\s\S]+)<\/div>/m); if (match) { data = match[1]; } // Prevent big images from loading when they aren't needed. // This must be done as a pre-injection step, since image loading can't be // canceled once embedded into the DOM. if (self.isListPage && self.isMobile) { data = data.replace(/<(img|iframe) .+?>/g, ''); } // Insert template to be rendered as nodes. content.innerHTML = data; if (self.isListPage) { var summary = document.createElement('div'); $(summary).addClass('post-content'); $(summary).addClass('post-summary'); body.insertBefore(summary, content); if (match) { // Use provided summary. summary.innerHTML = match[2]; } else { // Generate a summary. // Summary generation relies on DOM, so it must occur after content is // inserted into the page. summary.innerHTML = self.generateSummaryFromContent(content, 30); } // Add read more link to summary. var titleAnchor = $(this).find('.title a')[0]; var link = titleAnchor.cloneNode(true); link.innerHTML = 'Read More'; $(link).addClass('read-more'); summary.appendChild(link); } }); // Firefox does not allow for proper styling of BR. if (navigator.userAgent.indexOf('Firefox') > -1) { $('.post-content br').replaceWith('<span class="space"></span>'); } $('.loading').removeClass('loading'); }; BreakpointHandler.prototype.process = function() { if (!this.initted) { var makeInsecureImageRegex = function(hosts) { var whitelist = hosts.join('|').replace(/\./g,'\\.'); // Normal image tags, plus input images (yes, this is possible!) return new RegExp('(<(img|input)[^>]+?src=("|\'))http:\/\/(' + whitelist +')', 'g'); }; this.sslImageRegex = makeInsecureImageRegex(BreakpointHandler.KNOWN_HTTPS_HOSTS); this.sslImageCurrentDomainRegex = makeInsecureImageRegex([window.location.hostname]); this.detect(); this.initContent(); this.initted = true; } }; BreakpointHandler.KNOWN_HTTPS_HOSTS = [ "www.google.org", "www.google.com", "services.google.com", "blogger.com", "draft.blogger.com", "www.blogger.com", "photos1.blogger.com", "photos2.blogger.com", "photos3.blogger.com", "blogblog.com", "img1.blogblog.com", "img2.blogblog.com", "www.blogblog.com", "www1.blogblog.com", "www2.blogblog.com", "0.bp.blogspot.com", "1.bp.blogspot.com", "2.bp.blogspot.com", "3.bp.blogspot.com", "4.bp.blogspot.com", "lh3.googleusercontent.com", "lh4.googleusercontent.com", "lh5.googleusercontent.com", "lh6.googleusercontent.com", "themes.googleusercontent.com", ]; BreakpointHandler.prototype.rewriteForSSL = function(html) { // Handle HTTP -> HTTPS source replacement of images, movies, and other embedded content. return html.replace(this.sslImageRegex, '$1https://$4') .replace(this.sslImageCurrentDomainRegex, '$1//$4') .replace(/(<(embed|iframe)[^>]+?src=("|'))http:\/\/([^"']*?(youtube|picasaweb\.google)\.com)/g, '$1https://$4') // Slideshow SWF takes a image host, so we need to rewrite that parameter. .replace(/(<embed[^>]+?feed=http(?=[^s]))/g, '$1s'); }; $(document).ready(function() { var handler = new BreakpointHandler(); handler.process(); // Top-level navigation. $(".BlogArchive .tab").click(function(ev) { ev.preventDefault(); $(this).parent().toggleClass('active'); $(this).siblings().slideToggle(300); }); $(".Label .tab").click(function(ev) { ev.preventDefault(); $(this).parent().toggleClass('active'); $(this).siblings().slideToggle(300); }); // Blog archive year expansion. $('.BlogArchive .intervalToggle').click(function(ev) { ev.preventDefault(); if ($(this).parent().hasClass('collapsed')) { $(this).parent().removeClass('collapsed'); $(this).parent().addClass('expanded'); } else { $(this).parent().removeClass('expanded'); $(this).parent().addClass('collapsed'); } }); // Reverse order of months. $('.BlogArchive .intervalToggle + div').each(function(_, items) { var year = $(this); year.children().each(function(_, month) { year.prepend(month); }); }); // Set anchors to open in new tab. $('.post-content img').parent().each(function(_, node) { if (node.nodeName == 'A') { $(this).attr('target', '_blank'); } }); // Process search requests. $('.searchBox input').on("keypress", function(ev) { if (ev.which == 13) { window.location.href = 'https://www.google.com/search?q=site%3A' + window.location.hostname + '%20' + encodeURIComponent ($(this).val()); } }); }); //]]> </script> <script> //<![CDATA[ function DeviceMotionSender(){if(!this.isIOS_()){return}window.addEventListener("devicemotion",this.onDeviceMotion_.bind(this),false);this.iframes=document.querySelectorAll("iframe.vrview")}DeviceMotionSender.prototype.onDeviceMotion_=function(e){var message={type:"DeviceMotion",deviceMotionEvent:this.cloneDeviceMotionEvent_(e)};for(var i=0;i<this.iframes.length;i++){var iframe=this.iframes[i];var iframeWindow=iframe.contentWindow;if(this.isCrossDomainIframe_(iframe)){iframeWindow.postMessage(message,"*")}}};DeviceMotionSender.prototype.cloneDeviceMotionEvent_=function(e){return{acceleration:{x:e.acceleration.x,y:e.acceleration.y,z:e.acceleration.z},accelerationIncludingGravity:{x:e.accelerationIncludingGravity.x,y:e.accelerationIncludingGravity.y,z:e.accelerationIncludingGravity.z},rotationRate:{alpha:e.rotationRate.alpha,beta:e.rotationRate.beta,gamma:e.rotationRate.gamma},interval:e.interval}};DeviceMotionSender.prototype.isIOS_=function(){return/iPad|iPhone|iPod/.test(navigator.userAgent)&&!window.MSStream};DeviceMotionSender.prototype.isCrossDomainIframe_=function(iframe){var html=null;try{var doc=iframe.contentDocument||iframe.contentWindow.document;html=doc.body.innerHTML}catch(err){}return html===null};var dms=new DeviceMotionSender; //]]> </script> <script type="text/javascript" src="https://www.blogger.com/static/v1/widgets/984859869-widgets.js"></script> <script type='text/javascript'> window['__wavt'] = 'AOuZoY51pGPN_QXDea3_74-KDoUtYoO7Sw:1732421397606';_WidgetManager._Init('//www.blogger.com/rearrange?blogID\x3d10861780','//googleblog.blogspot.com/search/label/security','10861780'); _WidgetManager._SetDataContext([{'name': 'blog', 'data': {'blogId': '10861780', 'title': 'Official Google Blog', 'url': 'https://googleblog.blogspot.com/search/label/security', 'canonicalUrl': 'https://googleblog.blogspot.com/search/label/security', 'homepageUrl': 'https://googleblog.blogspot.com/', 'searchUrl': 'https://googleblog.blogspot.com/search', 'canonicalHomepageUrl': 'https://googleblog.blogspot.com/', 'blogspotFaviconUrl': 'https://googleblog.blogspot.com/favicon.ico', 'bloggerUrl': 'https://www.blogger.com', 'hasCustomDomain': false, 'httpsEnabled': true, 'enabledCommentProfileImages': true, 'gPlusViewType': 'FILTERED_POSTMOD', 'adultContent': false, 'analyticsAccountNumber': 'G-2PXZD4EB4F', 'analytics4': true, 'encoding': 'UTF-8', 'locale': 'en', 'localeUnderscoreDelimited': 'en', 'languageDirection': 'ltr', 'isPrivate': false, 'isMobile': false, 'isMobileRequest': false, 'mobileClass': '', 'isPrivateBlog': false, 'isDynamicViewsAvailable': true, 'feedLinks': '\x3clink rel\x3d\x22alternate\x22 type\x3d\x22application/atom+xml\x22 title\x3d\x22Official Google Blog - Atom\x22 href\x3d\x22https://googleblog.blogspot.com/feeds/posts/default\x22 /\x3e\n\x3clink rel\x3d\x22alternate\x22 type\x3d\x22application/rss+xml\x22 title\x3d\x22Official Google Blog - RSS\x22 href\x3d\x22https://googleblog.blogspot.com/feeds/posts/default?alt\x3drss\x22 /\x3e\n\x3clink rel\x3d\x22service.post\x22 type\x3d\x22application/atom+xml\x22 title\x3d\x22Official Google Blog - Atom\x22 href\x3d\x22https://www.blogger.com/feeds/10861780/posts/default\x22 /\x3e\n', 'meTag': '', 'adsenseHostId': 'ca-host-pub-1556223355139109', 'adsenseHasAds': false, 'adsenseAutoAds': false, 'boqCommentIframeForm': true, 'loginRedirectParam': '', 'view': '', 'dynamicViewsCommentsSrc': '//www.blogblog.com/dynamicviews/4224c15c4e7c9321/js/comments.js', 'dynamicViewsScriptSrc': '//www.blogblog.com/dynamicviews/d78375fb222d99b3', 'plusOneApiSrc': 'https://apis.google.com/js/platform.js', 'disableGComments': true, 'interstitialAccepted': false, 'sharing': {'platforms': [{'name': 'Get link', 'key': 'link', 'shareMessage': 'Get link', 'target': ''}, {'name': 'Facebook', 'key': 'facebook', 'shareMessage': 'Share to Facebook', 'target': 'facebook'}, {'name': 'BlogThis!', 'key': 'blogThis', 'shareMessage': 'BlogThis!', 'target': 'blog'}, {'name': 'X', 'key': 'twitter', 'shareMessage': 'Share to X', 'target': 'twitter'}, {'name': 'Pinterest', 'key': 'pinterest', 'shareMessage': 'Share to Pinterest', 'target': 'pinterest'}, {'name': 'Email', 'key': 'email', 'shareMessage': 'Email', 'target': 'email'}], 'disableGooglePlus': true, 'googlePlusShareButtonWidth': 0, 'googlePlusBootstrap': '\x3cscript type\x3d\x22text/javascript\x22\x3ewindow.___gcfg \x3d {\x27lang\x27: \x27en\x27};\x3c/script\x3e'}, 'hasCustomJumpLinkMessage': true, 'jumpLinkMessage': 'Read more', 'pageType': 'index', 'searchLabel': 'security', 'pageName': 'security', 'pageTitle': 'Official Google Blog: security', 'metaDescription': 'Insights from Googlers into our products, technology, and the Google culture'}}, {'name': 'features', 'data': {}}, {'name': 'messages', 'data': {'edit': 'Edit', 'linkCopiedToClipboard': 'Link copied to clipboard!', 'ok': 'Ok', 'postLink': 'Post Link'}}, {'name': 'template', 'data': {'name': 'custom', 'localizedName': 'Custom', 'isResponsive': false, 'isAlternateRendering': false, 'isCustom': true}}, {'name': 'view', 'data': {'classic': {'name': 'classic', 'url': '?view\x3dclassic'}, 'flipcard': {'name': 'flipcard', 'url': '?view\x3dflipcard'}, 'magazine': {'name': 'magazine', 'url': '?view\x3dmagazine'}, 'mosaic': {'name': 'mosaic', 'url': '?view\x3dmosaic'}, 'sidebar': {'name': 'sidebar', 'url': '?view\x3dsidebar'}, 'snapshot': {'name': 'snapshot', 'url': '?view\x3dsnapshot'}, 'timeslide': {'name': 'timeslide', 'url': '?view\x3dtimeslide'}, 'isMobile': false, 'title': 'Official Google Blog', 'description': 'Insights from Googlers into our products, technology, and the Google culture', 'url': 'https://googleblog.blogspot.com/search/label/security', 'type': 'feed', 'isSingleItem': false, 'isMultipleItems': true, 'isError': false, 'isPage': false, 'isPost': false, 'isHomepage': false, 'isArchive': false, 'isSearch': true, 'isLabelSearch': true, 'search': {'label': 'security', 'resultsMessage': 'Showing posts with the label security', 'resultsMessageHtml': 'Showing posts with the label \x3cspan class\x3d\x27search-label\x27\x3esecurity\x3c/span\x3e'}}}]); _WidgetManager._RegisterWidget('_HeaderView', new _WidgetInfo('Header1', 'header', document.getElementById('Header1'), {}, 'displayModeFull')); _WidgetManager._RegisterWidget('_BlogView', new _WidgetInfo('Blog1', 'main', document.getElementById('Blog1'), {'cmtInteractionsEnabled': false, 'navMessage': 'Showing posts with label \x3cb\x3esecurity\x3c/b\x3e. \x3ca href\x3d\x22https://googleblog.blogspot.com/\x22\x3eShow all posts\x3c/a\x3e'}, 'displayModeFull')); _WidgetManager._RegisterWidget('_HTMLView', new _WidgetInfo('HTML8', 'sidebar-top', document.getElementById('HTML8'), {}, 'displayModeFull')); _WidgetManager._RegisterWidget('_LabelView', new _WidgetInfo('Label1', 'sidebar', document.getElementById('Label1'), {}, 'displayModeFull')); _WidgetManager._RegisterWidget('_BlogArchiveView', new _WidgetInfo('BlogArchive1', 'sidebar', document.getElementById('BlogArchive1'), {'languageDirection': 'ltr', 'loadingMessage': 'Loading\x26hellip;'}, 'displayModeFull')); _WidgetManager._RegisterWidget('_HTMLView', new _WidgetInfo('HTML6', 'sidebar', document.getElementById('HTML6'), {}, 'displayModeFull')); _WidgetManager._RegisterWidget('_HTMLView', new _WidgetInfo('HTML5', 'sidebar-bottom', document.getElementById('HTML5'), {}, 'displayModeFull')); _WidgetManager._RegisterWidget('_HTMLView', new _WidgetInfo('HTML1', 'sidebar-bottom', document.getElementById('HTML1'), {}, 'displayModeFull')); _WidgetManager._RegisterWidget('_HTMLView', new _WidgetInfo('HTML2', 'footer-1', document.getElementById('HTML2'), {}, 'displayModeFull')); _WidgetManager._RegisterWidget('_HTMLView', new _WidgetInfo('HTML3', 'footer-2', document.getElementById('HTML3'), {}, 'displayModeFull')); _WidgetManager._RegisterWidget('_HTMLView', new _WidgetInfo('HTML4', 'footer-3', document.getElementById('HTML4'), {}, 'displayModeFull')); </script> </body> </html>