Stories
Slash Boxes
Comments

SoylentNews is people

posted by martyb on Tuesday September 13 2016, @04:37AM   Printer-friendly
from the alert-when-phish-are-biting dept.

From Google, a plugin that detects when you type your google.com password into a non-Google web page.

https://jigsaw.google.com/products/password-alert/

Fake login pages tricks users to give their password to an attacker. These "phishing pages," when well-crafted, are successful about 45% of time. When a password has been stolen, the attacker uses the email account to gather harmful information, or to email others, pretending to be the account holder.

The tool works like a spellchecker, except instead of looking for typos it's looking to see if you enter your Google password into anywhere other than your account sign-in page. If it detects that you've mistakenly entered your password in the wrong place, it immediately alerts you and asks you to change your password to be safe again.

So it is somewhat analogous to cert-pinning for passwords. It would be nice if they expanded it to all website/password combos instead of just google.com


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 0) by Anonymous Coward on Tuesday September 13 2016, @11:05AM

    by Anonymous Coward on Tuesday September 13 2016, @11:05AM (#401244)

    So, will it log all those yummy passwords to an obscure remote server for our own good?

  • (Score: 0) by Anonymous Coward on Tuesday September 13 2016, @03:13PM

    by Anonymous Coward on Tuesday September 13 2016, @03:13PM (#401335)

    No, of course not. They'd never put sensitive data like this in a log. They'll use a proper database, of course.

    • (Score: -1, Flamebait) by Anonymous Coward on Tuesday September 13 2016, @03:38PM

      by Anonymous Coward on Tuesday September 13 2016, @03:38PM (#401346)

      Hopefully it is MariaDB, that way they can share the results with the world. With their security track record don't even need to know the user name and password for the server because proper content in a SELECT statement gives you the proper privileges.