Google to scan for suspicious email activity

Powered by SC Magazine
 

Users will be notified of shady Gmail logins.

In hopes of combating spam and cybercrime, Google said that it will be notifying users of suspicious activity on their Gmail accounts.

The company said that it would begin offering its users details on when their accounts were last accessed and logs of the IP addresses used to log-in to the online e-mail service.

The new feature will present users with a log-in history sorted by IP address and location of the activity. Additionally, users will be notified when their Gmail accounts are accessed from a different region of the world and given the opportunity to change their log-in credentials from within the same window.

The company is also planning to eventually extend the feature to its Apps online productivity suite.

The aim, said Google, was to help users prevent attackers from hijacking their accounts and using their names for spam activity or social engineering attacks directed towards friends and family members.

"While we don't have the capability to determine the specific location from which an account is accessed, a login appearing to come from one country and occurring a few hours after a login from another country may trigger an alert," wrote Google engineering director Pavni Diwanji in a posting to the Google security blog.

"Keep in mind that these notifications are meant to alert you of suspicious activity but are not a replacement for account security best practices."

Copyright ©v3.co.uk


Google to scan for suspicious email activity
 
 
 
Top Stories
The CISO’s dilemma: Do you trust your partner’s partner?
[Blog post] How far down the chain do you check?
 
Microsoft confirms Australian Azure launch
Available from next week.
 
NBN Co names first 140 FTTN sites
National trial extended.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  24%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  22%
 
End user computing (desktops, mobiles, apps)
  14%
 
Software development
  28%
TOTAL VOTES: 276

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  62%
 
No
  38%
TOTAL VOTES: 92

Vote