Fact-checked by Grok 2 weeks ago

Google Authenticator

Google Authenticator is a free mobile application developed by Google that generates time-based one-time passwords (TOTPs) for two-step verification (2SV), providing an additional layer of security for online accounts beyond just a username and password. The app operates offline by using the device's clock and a shared secret key to produce six-digit codes that refresh every 30 seconds, compatible with any service supporting the TOTP standard as outlined in RFC 6238. It is available on both Android and iOS platforms, where users scan a QR code during setup to link accounts securely. Released in 2010, Google Authenticator was introduced to popularize (MFA) among consumers and help protect s from unauthorized access, especially in cases where passwords might be compromised. The project stems from Google's open-source initiative, which includes implementations of one-time passcode generators for mobile platforms and a (PAM) for systems, promoting widespread adoption of secure authentication practices. Over time, the app has evolved to address user needs, such as the addition of cloud synchronization in 2023, allowing codes to be backed up and transferred across devices via a for easier recovery without losing access to linked services. As a key tool in modern cybersecurity, Google Authenticator supports numerous websites and applications, including Google's own services, by enabling users to verify their identity quickly and reliably without relying on SMS-based codes, which can be vulnerable to interception. Its simplicity and lack of need for internet connectivity during code generation make it a preferred choice for enhancing account protection in both personal and professional contexts.

Overview

History and Development

Google Authenticator was released in September 2010 as a free mobile application to support two-factor authentication (2FA), enabling users to generate time-based one-time passwords (TOTP) for enhanced account security. This launch aligned with Google's broader initiative to bolster defenses following the cyberattacks, a sophisticated discovered in late 2009 that targeted 's infrastructure and intellectual property, compromising the accounts of activists. The incident, attributed to actors in , prompted Google to prioritize multi-factor methods to mitigate risks from password-only logins, marking a pivotal shift in the company's security strategy. The development of Google Authenticator included an open-source library hosted on the google-authenticator GitHub project, which provided implementations for generating one-time passcodes on mobile platforms such as Android, iOS, and BlackBerry, alongside a Pluggable Authentication Module (PAM) for integrating 2FA into server environments like SSH. This open-source approach facilitated widespread adoption and interoperability, with the PAM module allowing two-factor verification in Linux-based systems without proprietary dependencies. The project also standardized the Key URI format for provisioning authenticator accounts via QR codes, a specification that became a de facto reference for TOTP-compatible apps. Contributions from the open-source community have refined these components, ensuring compatibility with OATH standards for HOTP and TOTP algorithms. In April 2023, rolled out a major update introducing optional cloud syncing for Authenticator accounts, backed up to users' Accounts and accessible across and devices, thereby simplifying recovery after device loss or replacement while maintaining for codes. This feature addressed user feedback on the app's previous lack of backup options, which had required manual rescans for transfers. By November 2024, further enhancements included a redesigned interface with Material You theming and improved search functionality for managing accounts. These updates reflected 's ongoing emphasis on usability and security in response to evolving threats. As of 2025, Google Authenticator has deepened its integration within Google's (MFA) ecosystem, supporting the company's phase-out of SMS-based 2FA for in favor of more secure alternatives like scanning and passkeys. This shift, announced in early 2025, aims to reduce vulnerabilities from SIM-swapping attacks by prioritizing app-generated codes and biometric verifiers, with mandatory MFA enforcement rolling out for Google Cloud services worldwide. The app's core development remains led by Google's teams, who collaborate with open-source contributors to maintain standards compliance and adapt to regulatory demands for robust .

Key Features

Google Authenticator primarily generates time-based one-time passwords (TOTPs) consisting of 6 to 8 digits that automatically refresh every 30 seconds, providing users with short-lived codes for two-factor authentication without relying on network connectivity after setup. This standard aligns with the TOTP protocol defined in RFC 6238, ensuring compatibility with services implementing . The app supports managing multiple accounts within a single interface, allowing users to add and organize entries for various services such as , , or custom websites through customizable labels that facilitate quick identification and access. Users can edit these labels directly in the app to personalize their setup, enhancing usability for those handling numerous authenticated accounts. A key capability introduced in 2023 is cloud synchronization, which enables encrypted backups of authentication codes to a user's for seamless restoration across devices. This feature stores codes securely in transit and at rest, allowing automatic syncing on compatible platforms like 6.0+ and 14.0+, thereby preventing loss of access due to device changes or failures. For added security, Google Authenticator incorporates biometric protection, requiring authentication via or on devices, or fingerprint, PIN, or pattern on , to unlock and view generated codes. This privacy screen feature safeguards sensitive information from unauthorized access even if the device is unlocked. The app's offline functionality further distinguishes it, as it generates TOTPs locally using the device's clock without needing an post-initial configuration. Account addition is streamlined through QR code scanning, which supports the otpauth:// URI scheme to import shared secrets efficiently from compatible services. This method allows for rapid setup and transfer between devices, promoting ease of use in diverse ecosystems.

Functionality

Setup Process

To set up Google Authenticator, users first download the app from the Google Play Store on Android devices or the Apple App Store on iOS devices. Upon opening the app for the first time, users are prompted to create an initial backup or enable cloud syncing by signing in with a Google Account, which securely stores authentication codes across devices for easier recovery. To link the app to a service such as a , users enable two-factor authentication (2FA) in the service's security settings, where a is generated for setup. In the Google Authenticator app, users tap the "+" icon to add an account, select the scan option, and use the device's camera to capture the code, which encodes the using the otpauth scheme. If scanning fails—due to poor lighting, damaged code, or device limitations—users can select the manual entry option and input the provided secret key (typically a 16- or 32-character alphanumeric string), along with the issuer name (e.g., "Google") and account email for labeling. Once added, the app immediately generates a six-digit (TOTP) for the account. Users then enter this into the service's prompt to complete the initial linking and confirm that the app is correctly configured. As part of the 2FA enrollment on the service, users should also download and securely store the provided recovery codes—typically 10 single-use numeric codes—that allow account access in case the app is lost or unavailable. Common setup issues often involve time synchronization errors, where generated codes do not match the service's expectations due to device clock drift. To resolve this, users ensure their 's date, time, and are set to automatic with the network carrier or ; on , this is adjusted in Settings > System > Date & time, while on , it is in Settings > General > Date & Time. If issues persist, restarting the or reinstalling the app can recalibrate the internal clock without affecting linked accounts, provided cloud sync is enabled.

Daily Usage

Users open the Google Authenticator app on their to retrieve the current 6-digit verification associated with a specific account, which automatically refreshes every 30 seconds to ensure (TOTP) validity. During prompts on supporting websites or apps, they copy or manually enter this as the second factor after providing their password, completing the (MFA) process securely. The app supports managing multiple accounts by allowing users to edit account labels for better identification—through a long-press on the entry followed by selecting the edit icon—and reorder them via drag-and-drop or swipe gestures for prioritized access. Unused accounts can be removed by swiping left on the entry or selecting a delete option, helping maintain an organized list without affecting the underlying secrets. Time drift, where device clock inaccuracies cause codes to fail validation, can be addressed through the app's settings menu, where users select "Time correction for codes" and tap "Sync now" to realign with Google's servers; however, in versions 7.0 and later, this feature has been removed in favor of relying on the device's operating system time for automatic synchronization. Transferring accounts to a new device involves opening the app on the old device, navigating to the menu, selecting "Transfer accounts" then "Export accounts," and choosing accounts to generate QR codes for scanning on the new device; alternatively, manual entry of secret keys is possible, with cloud sync simplifying the process for all accounts. While the app does not send alerts for individual code expirations due to their 30-second cycle, it provides optional notifications for transfer sync status and integrates directly with services such as and , enabling seamless MFA during logins by generating codes on-device without requiring separate apps.

Technical Implementation

TOTP Algorithm

The (TOTP) algorithm, as implemented in Google Authenticator, generates temporary authentication codes by combining a key with the current time, ensuring codes change every 30 seconds for enhanced security. Defined in RFC 6238, TOTP extends the (HOTP) mechanism by using time as a dynamic counter rather than an event-based one. This approach produces a six-digit code valid for a single short interval, promoting interoperability across compliant systems. At its core, the TOTP value is computed as follows: first, calculate the counter C = \left\lfloor \frac{T - T_0}{X} \right\rfloor, where T is the current Unix time in seconds, T_0 is the epoch time offset (default 0), and X is the time step interval (default 30 seconds). Then, apply the HOTP function: \text{TOTP} = \text{HOTP}(H, C), where H is the shared secret key, and the result is truncated to six decimal digits for display. Google Authenticator defaults to HMAC-SHA1, 6-digit codes, and 30-second intervals, ignoring other values specified in the provisioning URI. The HOTP function itself relies on the HMAC-SHA1 hashing algorithm: it computes \text{HMAC-SHA1}(H, C), a 20-byte hash, then applies dynamic truncation by selecting four bytes starting from an offset derived from the last nibble of the hash (modulo 16, multiplied by 4) to form a 31-bit integer, which is taken modulo $10^6 to yield the final code. This truncation handles potential counter overflows and ensures consistent output length regardless of hash variations. The key H in Google Authenticator is an arbitrary value typically encoded as 16 to 32 characters (corresponding to 10 to 20 bytes or 80 to 160 bits when decoded), per RFC 3548 for provisioning via QR codes or manual entry, with padding omitted to match the standard. These keys are stored securely in the app's local encrypted storage (with plaintext storage in versions prior to 2023). For reliable operation, Google Authenticator relies on the device's system clock to derive T, assuming with network time protocols like NTP. To accommodate minor clock drifts between the device and server (up to ±30 seconds), the app and verifying servers typically tolerate a window of one interval in either direction, accepting the current code or the one from the adjacent period without requiring manual resynchronization. Google Authenticator complies with the (OATH) standards through its adherence to RFC 6238, enabling seamless interoperability with other TOTP-compatible applications and services that use the same HMAC-SHA1 parameters and key format. This standardization ensures that codes generated by the app can be validated by any OATH-compliant verifier, fostering widespread adoption in ecosystems.

HOTP Support and Variations

Google Authenticator implements the (HOTP) algorithm as defined in RFC 4226, which generates codes using a key K and an incrementing counter C rather than a time-based factor. The core computation follows the formula HOTP(K, C) = Truncate(HMAC-SHA1(K, C)), where the HMAC-SHA1 output is truncated to produce a 6-digit code, similar to the base hashing mechanism in TOTP but event-driven by counter increments instead of time steps. Support for HOTP in Google Authenticator is limited compared to its primary TOTP functionality, primarily serving legacy systems or custom integrations where servers require counter-based authentication. Provisioning an HOTP account involves scanning a QR code with a key URI specifying "type=hotp" and an initial counter value, after which the app maintains a local counter per account that increments upon each code generation. In cases of counter desynchronization—such as when the app generates unused codes or the server advances its differently—Google Authenticator handles through user-initiated resets, typically by removing and re-adding the account to restore the initial counter state. This approach is used in rare scenarios, including emulating hardware tokens for systems that deploy physical HOTP devices, allowing the app to substitute as a software-based alternative without dedicated hardware. Unlike the time-driven TOTP method, which refreshes codes every 30 seconds automatically, HOTP is event-driven, relying on synchronized counters between client and ; mismatches can lead to replay risks if not addressed, though the app's emphasizes manual intervention for alignment. The implementation extends to the open-source libpam--authenticator library, which integrates HOTP into pluggable modules () for services like SSH, supporting options such as counter non-increment on failed attempts to aid .

Platforms and Integration

Supported Devices and Availability

Google Authenticator is available as a native mobile application for both Android and iOS devices. On Android, it requires version 5.0 (Lollipop) or later, and can be downloaded from the Google Play Store. On iOS, the app supports iPhone, iPad, and iPod touch running iOS 14.0 or later (including iPadOS 14.0 or later), and is distributed via the Apple App Store. There is no official desktop application for Google Authenticator, though users can perform initial scanning for setup using a in conjunction with a . For systems, integration is possible through the open-source libpam-google-authenticator library, which enables (PAM) support for verification in services like SSH. The is available for free download worldwide through the respective app stores, with no advertisements or in-app purchases. As of 2025, it has surpassed 100 million installs on devices alone. While there are no major regional restrictions, availability on the Apple may vary by country or region due to local regulations, though it is broadly accessible across most markets; updates are delivered automatically via the stores. Hardware requirements are minimal and align with standard smartphone capabilities. A built-in camera is necessary for scanning QR codes during account setup, and the app utilizes secure storage mechanisms—such as Android's Keystore system or iOS's Secure Enclave—to protect authentication keys.

Third-Party Compatibility

Google Authenticator adheres to the Open Authentication (OATH) standards defined in RFC 6238 for (TOTP) and RFC 4226 for (HOTP), ensuring broad compatibility with third-party services that implement these protocols for (MFA). This allows the app to generate verification codes for platforms including , , , and banking services such as and , where users scan a during setup to link their account. The app facilitates automated setup via the otpauth:// scheme, which encodes essential parameters in a scannable format. The standard URI structure is otpauth://totp/[issuer]:[user]?secret=[base32-secret]&issuer=[issuer], where the issuer identifies the service, the user specifies the account label, and the secret is the shared key in encoding; additional optional parameters like digits (default 6) and period (default 30 seconds for TOTP) can be included for customization. This scheme promotes interoperability by aligning with the key format recommended for TOTP/HOTP provisioning across compatible authenticators. For server-side , provides the open-source google-authenticator-libpam under the , which enables verification of codes generated by the app in custom applications or via Pluggable Authentication Modules () on and Unix systems. This module supports both TOTP and HOTP algorithms, allowing secure logins for services like SSH or by requiring a alongside traditional credentials, with user secrets stored in ~/.google_authenticator. In contrast, the core Authenticator mobile application remains , governed by 's without availability. (noting proprietary status) Google Authenticator plays a key role in enterprise MFA ecosystems through integration with Google Cloud Identity Platform (powered by Firebase Authentication), where developers can use APIs to provision TOTP secrets, enroll users via generation, and verify second-factor assertions during sign-in. This includes methods like MultiFactorUser.enroll() for adding TOTP factors and PhoneAuthProvider extensions for handling assertions, enabling scalable MFA deployment in web and mobile apps. However, the app lacks native support for FIDO2 or passkeys, deferring to platform-specific browser or device handlers for those standards, and may face compatibility challenges with non-standard HOTP implementations that alter counter mechanics or use non-SHA1 hashing beyond the specifications. (example issue discussions)

Security Aspects

Strengths and Vulnerabilities

Google Authenticator's primary strengths lie in its offline functionality, which allows users to generate time-based one-time passwords (TOTP) without requiring an connection or service, thereby minimizing exposure to man-in-the-middle attacks that rely on network interception. This offline capability ensures that codes can be produced securely on even in environments with compromised . Additionally, the TOTP algorithm's time-limited codes, typically valid for only 30 seconds, inherently prevent replay attacks by rendering intercepted codes obsolete shortly after generation. Local storage of authentication data is encrypted at rest, protecting seeds and generated codes from unauthorized access on itself. Despite these advantages, the app's cloud sync feature, introduced in , has raised significant concerns due to the lack of , potentially exposing synced codes if a user's is compromised through or other means—as of November 2025, this has not been implemented despite earlier promises. This vulnerability was highlighted in incidents like the Retool breach, where exploited the unencrypted sync to access multiple customer accounts after compromising employee credentials, though the risk is somewhat circularly mitigated by requiring 2FA on the itself. Device presents another risk, as physical access to an unlocked could allow to view and use generated codes without additional barriers beyond the device's own , unless enhanced features like biometric are enabled. Historically, early versions of Google Authenticator prior to the 2023 sync update lacked built-in backup mechanisms, often resulting in permanent account lockouts for users who lost or replaced their devices without manually exporting s or seeds. phishing remains a risk during the app's setup process, where users could be tricked into scanning malicious codes provided by attackers. The app's core design continued to offer improved resistance to SIM-swapping attacks compared to SMS-based 2FA, as it does not rely on cellular networks vulnerable to carrier hijacking. Overall, Google Authenticator provides lower security risks than 2FA, which is susceptible to and SIM swaps, but it falls short of hardware security keys for high-threat scenarios, where phishing-resistant protocols like FIDO2 offer stronger protection against remote exploits.

Best Practices and Alternatives

To maximize security when using Google Authenticator, users should enable biometric or PIN protection via the app's Privacy Screen feature in settings, which requires verification before accessing codes. Cloud sync for codes across devices should only be activated if the associated is protected by strong two-factor authentication (2FA), as the sync feature lacks , potentially exposing secrets if the account is compromised. Regularly updating the app ensures access to the latest security patches, while keeping the device's synchronized—typically via automatic settings—is essential for accurate (TOTP) generation, as discrepancies can invalidate codes. For accounts where alternatives are preferred, reserve Google Authenticator for lower-risk services to minimize exposure. Effective backup strategies mitigate the risk of losing access to codes. During initial 2FA setup for any account, generate recovery codes—typically a set of 8-10 one-time-use passcodes—and print them for offline storage in a secure physical location, such as a , rather than digital storage that could be hacked. Avoid sharing devices running the app, as this could allow unauthorized access to multiple accounts; instead, use device-level locks like on the phone itself. Several alternatives to Google Authenticator offer enhanced features for specific needs. Authy provides multi-device synchronization and encrypted cloud backups, allowing seamless access across phones and desktops without manual transfers. Microsoft Authenticator supports passkey integration alongside TOTP, enabling passwordless logins via biometrics for compatible services. For privacy-focused users on Android, Aegis Authenticator is an open-source option that stores codes locally with strong encryption and biometric unlock, avoiding reliance on proprietary cloud services. Hardware tokens like YubiKey offer superior phishing resistance through physical key protocols such as FIDO2, ideal for high-security environments where software apps may be vulnerable to malware. Users may consider switching to alternatives when needing desktop-native access, as with Authy, or advanced capabilities like push notifications for approval-based authentication, exemplified by Duo Mobile, which prompts users to confirm logins remotely without entering codes. Looking ahead, Google recommends transitioning to passkeys for 2025 and beyond, as they use and to provide phishing-resistant, superior to traditional TOTP apps.

References

  1. [1]
  2. [2]
    Protect your business with 2-Step Verification - Google Help
    Google Authenticator and other apps don't need an internet connection to generate codes. 2SV supports software and hardware tokens that use the TOTP (Time-based ...
  3. [3]
    Google Authenticator - App Store
    Rating 4.9 (970,094) · Free · iOSGoogle Authenticator adds an extra layer of security to your online accounts by adding a second step of verification when you sign in.
  4. [4]
    Google Authenticator - Apps on Google Play
    Rating 3.8 (622,696) · Free · AndroidJan 29, 2025 · Google Authenticator adds an extra layer of security to your online accounts by adding a second step of verification when you sign in.
  5. [5]
    The past, present and future of authentication - Google Blog
    Jul 17, 2023 · On the consumer side, we popularized MFA by releasing Google Authenticator in 2011 and offering MFA for all Google Accounts. Simultaneously ...<|control11|><|separator|>
  6. [6]
    Google Authenticator now supports Google Account synchronization
    Apr 24, 2023 · To try the new Authenticator with Google Account synchronization, simply update the app and follow the prompts. Making technology for everyone ...
  7. [7]
  8. [8]
  9. [9]
    Google Hack Attack Was Ultra Sophisticated, New Details Show
    Jan 14, 2010 · The name comes from references in the malware to the name of a file folder named "Aurora" that was on the computer of one of the attackers.Missing: development | Show results with:development
  10. [10]
    Open source version of Google Authenticator (except the Android app)
    Apr 6, 2021 · This GitHub project is specifically for the Google Authenticator apps which target the Blackberry and iOS mobile platforms.PAM module · Wiki · Sign in · Issues
  11. [11]
    Google Authenticator for multi-factor authentication - LWN.net
    Dec 7, 2011 · On the smartphone side, the Google Authenticator project provides application software for Android devices, Apple iPhones, and Blackberry ...
  12. [12]
    Google Authenticator can now sync 2FA codes to the cloud
    Apr 24, 2023 · As of today, Google Authenticator will now sync any one-time two-factor authentication (2FA) codes that it generates to users' Google Accounts.<|separator|>
  13. [13]
    Google Authenticator 7.0 rolls out Material You, search on Android
    Nov 14, 2024 · The last release came in April/May of 2023 with the four-color asterisk icon and Google Account cloud syncing. Google Authenticator 7.0.
  14. [14]
    Google Replacing SMS With QR Codes for Gmail Authentication
    Mar 4, 2025 · Google has said it's planning to stop sending 2FA codes via text message to verify Gmail accounts in favor of security tools such as passkeys and QR codes.Missing: MFA ecosystem
  15. [15]
    Mandatory MFA is coming to Google Cloud. Here's what you need to ...
    Nov 5, 2024 · We will be implementing mandatory MFA for Google Cloud in a phased approach that will roll out to all users worldwide during 2025.Missing: QR codes<|separator|>
  16. [16]
  17. [17]
    Google Authenticator - Apps on Google Play
    Rating 3.8 (622,696) · Free · AndroidJan 29, 2025 · Google Authenticator adds an extra layer of security to your online accounts by adding a second step of verification when you sign in.
  18. [18]
    Key Uri Format · google/google-authenticator Wiki - GitHub
    Secret keys may be encoded in QR codes as a URI with the following format: otpauth://TYPE/LABEL?PARAMETERS
  19. [19]
  20. [20]
  21. [21]
    RFC 6238 - TOTP: Time-Based One-Time Password Algorithm
    This document describes an extension of the One-Time Password (OTP) algorithm, namely the HMAC-based One-Time Password (HOTP) algorithm, as defined in RFC 4226.
  22. [22]
    Android Keystore system | Security - Android Developers
    Apr 17, 2025 · The Android Keystore system lets you store cryptographic keys in a container to make them more difficult to extract from the device.
  23. [23]
    How can I extract the TOTP secret from an iCloud Keychain?
    Jun 4, 2022 · Is there a mechanism to get these secrets back out (iOS or Mac OS or web) as plain text after ingesting them to the iCloud Keychain?
  24. [24]
    TOTP Authentication Explained: How It Works, Why It's Secure
    May 19, 2025 · This provides a secure second factor of authentication after the initial login. Supported authenticator apps include Google Authenticator, ...<|control11|><|separator|>
  25. [25]
    token - Does the TOTP Algorithm rely on the client time always being ...
    Nov 9, 2017 · Yes, TOTP needs roughly synchronized clocks, but a significant offset can be handled. The server can be lenient with a few time steps.TOTP Resynchronisation - Information Security Stack ExchangeSecurely detecting and correcting time drift for TOTPMore results from security.stackexchange.com
  26. [26]
    Home · google/google-authenticator Wiki - GitHub
    Apr 6, 2021 · The Google Authenticator project includes implementations of one-time passcode generators for several mobile platforms, as well as a pluggable authentication ...Key Uri Format · Checking Out · BlackBerry Development · Conflicting Accounts
  27. [27]
    Google Authenticator - Counter Based
    Sep 29, 2013 · In HOTP, the "changing value" is a counter, which is incremented after usage. Both parties (client and server) remember the last used counter ...How does Google Authenticator work?token - Does the TOTP Algorithm rely on the client time always being ...More results from security.stackexchange.com
  28. [28]
    RFC 4226: HOTP: An HMAC-Based One-Time Password Algorithm
    This document describes an algorithm to generate one-time password values, based on Hashed Message Authentication Code (HMAC).Missing: Google | Show results with:Google
  29. [29]
    google/google-authenticator-libpam - GitHub
    Google Authenticator PAM module. Example PAM module demonstrating two-factor authentication for logging into servers via SSH, OpenVPN, etc… This project is ...
  30. [30]
    Get verification codes with Google Authenticator - Android
    The Google Authenticator app can generate one-time verification codes for sites and apps that support Authenticator app 2-Step Verification.
  31. [31]
    Google Authenticator - ArchWiki
    Aug 14, 2025 · Google Authenticator provides a two-step authentication procedure using one-time passcodes (OTP), initially standardized by the Initiative for Open ...
  32. [32]
  33. [33]
  34. [34]
    2FA Websites List | Аn exhaustive list of services that support Two ...
    Аn exhaustive list of services that support Two-Factor Authentication (2FA) ability. Don't be hacked, enable two-factor authentication today.
  35. [35]
    Open source fork of the Google Authenticator Android app - GitHub
    Apr 6, 2021 · This project is an open source fork of the Google Authenticator Android app on the Play Store. While this fork is open source, the official version of the app ...Google/google-Authenticator... · Google Authenticator For... · Developer GuideMissing: library iOS BlackBerry
  36. [36]
    Add TOTP multi-factor authentication to your web app - Firebase
    If you've upgraded to Firebase Authentication with Identity Platform, you can add time-based one-time password (TOTP) multi-factor authentication (MFA) to your ...Enable Totp Mfa · Enroll Users In Totp Mfa · Sign In Users With A Second...
  37. [37]
    Google Authenticator synchronization raises MFA concerns
    Oct 16, 2023 · Google's Authenticator app was updated this year with a new synchronization feature for MFA codes, but experts warn of potential risks.
  38. [38]
    How Google Authenticator made one company's network breach ...
    Sep 15, 2023 · A security company is calling out a feature in Google's authenticator app that it says made a recent internal network breach much worse.
  39. [39]
    Can Google Authenticator Be Hacked: Myths and Realities - Bitget
    May 14, 2025 · This article delves into the security of Google Authenticator in the crypto and blockchain industries, exploring the feasibility of hacking ...
  40. [40]
    Android's theft protection features keep your device and data safe
    May 15, 2024 · When enabled, our new enhanced authentication will require biometrics for accessing and changing critical Google account and device settings ...
  41. [41]
    How to Restore Google Authenticator: 4 Recovery Tricks - wikiHow
    Aug 30, 2025 · To do this, go to accounts.google.com/signin/recovery and follow the on-screen instructions. Once recovered, just sign in to your Google account ...
  42. [42]
    PoisonSeed Attack Tricks Users into Scanning Malicious MFA QR ...
    Jul 21, 2025 · When users scan the QR code with their mobile MFA authenticator apps, they inadvertently complete the authentication process for the attackers, ...
  43. [43]
    The 7 best authenticator apps in 2025 - Zapier
    Jul 23, 2025 · The best authenticator apps are Google Authenticator, Microsoft Authenticator, Duo, Bitwarden, 2FAS, Authy, and Ente Auth.<|separator|>
  44. [44]
    Why App-Based MFA Is Better Than SMS: A 2025 Guide for Secure ...
    Jun 9, 2025 · The main risk with authenticator apps is losing access if your device is lost or the app is deleted. However, most services now provide recovery ...
  45. [45]
  46. [46]
    Why Security Keys Are Better for 2FA - Computero™
    May 31, 2023 · Google discovered that security keys are the best form of 2FA (two-factor authentication), and the only one resistant to phishing attacks.
  47. [47]
    Google Authenticator Sync security concerns: What IT should do
    May 12, 2025 · Researchers said the lack of encryption opens users up to data leakage and a possible Google account takeover.<|separator|>
  48. [48]
    How To Fix Google Authenticator Time Sync Issues? - YouTube
    Jul 6, 2025 · ... device's time is synced properly with the network. Next, we ... Keeping your app updated is also important, and we will explain how ...
  49. [49]
    How to Store Your 2FA Backup Codes Securely - Kolide
    When you set up 2FA for a service, you'd enter a one time setup code into an authenticator app (e.g., Google Authenticator or FreeOTP.) This will allow you to ...
  50. [50]
    How to Backup Google Authenticator or Transfer It to a New Phone
    Jun 30, 2022 · Another point against Google Authenticator backup codes is – they are as secure as a password written down on a paper. An intruder can easily ...
  51. [51]
    The beginner's guide to Google Authenticator - Daito 2FA
    Google offers a two-step verification process through the free mobile app Google Authenticator. When logging in from a new device or browser, it generates a ...
  52. [52]
  53. [53]
    Microsoft Mobile Phone Authenticator | Microsoft Security
    ### Summary of Microsoft Authenticator: Passkey Support
  54. [54]
    Aegis Authenticator
    - **Aegis is open-source**: Yes, explicitly stated as an open-source app.
  55. [55]
  56. [56]
    Best Authenticator App for 2025 - Security - TechRadar
    Oct 14, 2025 · Supports Android and iOS ... The app also supports account recovery through secure cloud backups, via iCloud on iOS and Google Drive on Android.
  57. [57]
    Passkeys - Google for Developers
    May 19, 2025 · Passkeys are a safer and easier alternative to passwords. With passkeys, users can sign in to apps and websites with a biometric sensor (such as a fingerprint ...Missing: 2024 | Show results with:2024