Feeds

Google gives GMail always-on encryption

New feature closes security loophole

Secure remote control for conventional and virtual desktops

Google is adding a much-demanded feature to its email service that offers improved security by ensuring users get an encrypted connection each time they access their account via a web connection.

The new option means email sessions are automatically protected from start to finish with the secure sockets layer protocol even if a user accesses the account by typing http://gmail.com, rather than https://gmail.com/ (notice the presence of "https" in the latter).

The move helps protect users against a vulnerability known as sidejacking, which researcher Rob Graham of Errata Security warned against last year. It turns out the vast majority of websites drop the SSL protection as soon as a user has logged in. This allows attackers to snoop on web sessions over unsecured Wi-Fi connections even when a password was typed into a page during an encrypted session.

Google is one of the only services we know of that guards against this threat by offering start-to-finish SSL protection. But up to now, users ran the risk that a connection might inadvertently be unprotected, either because they forgot to type in the correct URL or the connect was reset.

To turn on the feature, open your GMail account, choose settings and scroll to the bottom of the page. In the section labeled "Browser Connection," choose the radio button that says "Always use https." Google warns the protection could slow down connections, so if you don't use insecure networks you may not want to bother. The offering doesn't appear to be available yet for Google Apps.

If only eBay, Yahoo Mail, MySpace, Facebook and the rest of the gang would follow suit.

Google has more about the feature here. (Hat tip to Spyware Sucks blog.) ®

Remote control for virtualized desktops

More from The Register

next story
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.