{"id":12661,"date":"2026-05-11T06:31:48","date_gmt":"2026-05-11T06:31:48","guid":{"rendered":"https:\/\/wildgreenquest.com\/?p=12661"},"modified":"2026-05-11T06:31:48","modified_gmt":"2026-05-11T06:31:48","slug":"google-and-microsoft-warn-passkeys-may-not-stop-hackers","status":"publish","type":"post","link":"https:\/\/wildgreenquest.com\/?p=12661","title":{"rendered":"Google And Microsoft Warn Passkeys May Not Stop Hackers"},"content":{"rendered":"<p><br \/>\n<\/p>\n<div>\n<figure class=\"embed-base image-embed embed-1\" role=\"presentation\">\n<div style=\"padding-top:55.84%;position:relative\" class=\"image-embed__placeholder\"><picture><source media=\"(min-width: 960px)\" sizes=\"50vw\" srcset=\"https:\/\/imageio.forbes.com\/specials-images\/imageserve\/690385811693a77280388051\/Hacking-attack-in-Progress\/0x0.jpg?crop=2618%2C1462%2Cx612%2Cy423%2Csafe&amp;width=960&amp;dpr=1 1x, https:\/\/imageio.forbes.com\/specials-images\/imageserve\/690385811693a77280388051\/Hacking-attack-in-Progress\/0x0.jpg?crop=2618%2C1462%2Cx612%2Cy423%2Csafe&amp;width=960&amp;dpr=1.5 1.5x, https:\/\/imageio.forbes.com\/specials-images\/imageserve\/690385811693a77280388051\/Hacking-attack-in-Progress\/0x0.jpg?crop=2618%2C1462%2Cx612%2Cy423%2Csafe&amp;width=960&amp;dpr=2 2x\"\/><\/picture><\/div>\n<div>\n<div class=\"bMqrj\">\n<p><span style=\"-webkit-line-clamp:2\" class=\"Ccg9Ib-7 _8XF2kHYM\">Passkeys may not stop hackers.<\/span><\/p>\n<p><small class=\"pGGCM2aD\">getty<\/small><\/div>\n<\/div>\n<\/figure>\n<p>Passkeys are supposed to replace passwords and stop phishing attacks. But Google and Microsoft warn that passkeys alone are not enough if weaker recovery methods remain attached to accounts. \u201cEach account is only as secure as its weakest credential,\u201d Microsoft says, warning that passwords and SMS recovery options can become a new attack surface even after passkeys are deployed.<\/p>\n<p>\u201cPasskeys are an easier and safer way to access online accounts compared to passwords,\u201d Google says, \u201cand even traditional multi-factor methods.\u201d But passkeys are not 100% safe on their own. In a new warning to its account holders, <a rel=\"nofollow\" class=\"color-link\" href=\"https:\/\/blog.google\/innovation-and-ai\/technology\/safety-security\/world-password-day-2026\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-ga-track=\"ExternalLink:https:\/\/blog.google\/innovation-and-ai\/technology\/safety-security\/world-password-day-2026\/\" aria-label=\"Google\">Google<\/a> says \u201ceven when you normally use a passkey, it\u2019s important to secure your account with <a rel=\"nofollow\" class=\"color-link\" href=\"https:\/\/support.google.com\/accounts\/answer\/185839?hl=en&amp;co=GENIE.Platform%3DAndroid\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-ga-track=\"ExternalLink:https:\/\/support.google.com\/accounts\/answer\/185839?hl=en&amp;co=GENIE.Platform%3DAndroid\" aria-label=\"two-step verification\">two-step verification<\/a> (2SV).&#8221; You need this in case \u201csomeone tries to impersonate you and claims to have lost your passkey.&#8221;<\/p>\n<p><span class=\"link-embed__info\"><span class=\"link-embed__provider\">Forbes<\/span><span class=\"link-embed__title\">\u2018A Big Deal\u2019\u2014Google\u2019s Gmail Upgrade Is Now Going Live<\/span><small class=\"link-embed__byline\">By <span class=\"link-embed__author\">Zak Doffman<\/span><\/small><\/span><span class=\"link-embed__thumbnail-wrapper\"><span class=\"link-embed__thumbnail allow-inline-style\" style=\"background-image:url(https:\/\/specials-images.forbesimg.com\/imageserve\/690f1d9e7a80b726e48fa3dd\/960x0.jpg?cropX1=526&amp;cropX2=2817&amp;cropY1=649&amp;cropY2=1937)\"\/><\/span><\/p>\n<p>If there is an automated recovery process that exploits weaker credentials to bypass a passkey, then that passkey is not 100% safe \u2014 it really is that simple. Attackers can target recovery flows and fallback credentials instead of passkeys.<\/p>\n<p>This is an interesting twist \u2014 because much of the rhetoric is that a passkey alone <em>is<\/em> enough. But <a rel=\"nofollow\" class=\"color-link\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2026\/05\/07\/world-passkey-day-advancing-passwordless-authentication\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-ga-track=\"ExternalLink:https:\/\/www.microsoft.com\/en-us\/security\/blog\/2026\/05\/07\/world-passkey-day-advancing-passwordless-authentication\/\" aria-label=\"Microsoft\">Microsoft<\/a> flags account recovery as a new attack surface, as the surge in passkey use shuts down traditional attack methods. <\/p>\n<p>\u201cDeploying passkeys improves sign-in,&#8221; Microsoft says. &#8220;But most accounts still have a password or SMS method attached &#8216;just in case\u2019 \u2014 and as long as those credentials exist, they\u2019re an attack surface.\u201d<\/p>\n<figure class=\"embed-base image-embed embed-2\" role=\"presentation\">\n<div>\n<div class=\"bMqrj\">\n<p><span style=\"-webkit-line-clamp:2\" class=\"Ccg9Ib-7 _8XF2kHYM\">Prevent hackers accessing your account. <\/span><\/p>\n<p><small class=\"pGGCM2aD\">Google<\/small><\/div>\n<\/div>\n<\/figure>\n<p>The best recovery method is to use your account passkey on a different device to complete a recovery step. As a back-up, Microsoft says a process that pushes users to provide ID and a face scan is best. \u201cAs NIST recommends, high-assurance recovery requires government-issued ID and biometric verification.\u201d<\/p>\n<p>Microsoft\u2019s advice is aimed at enterprise users \u2014 Google\u2019s primarily at home users. That\u2019s a major difference, but it doesn\u2019t remove the threat. Gmail and other Google accounts are high-value to cyber attackers, and remain under attack.<\/p>\n<p>Google tells users to add 2SV to \u201cprevent hackers from accessing your account with an additional layer of security.&#8221; But given an attacker can use Google\u2019s account recovery process, pretending to be you and claiming a passkey has been lost, the form of 2SV becomes more critical than ever. There are two types you should use. Google Prompts and an Authenticator (which can be an app on your phone).<\/p>\n<p><span class=\"link-embed__info\"><span class=\"link-embed__provider\">Forbes<\/span><span class=\"link-embed__title\">Has Google Secretly Changed Your Chrome Settings?<\/span><small class=\"link-embed__byline\">By <span class=\"link-embed__author\">Zak Doffman<\/span><\/small><\/span><span class=\"link-embed__thumbnail-wrapper\"><span class=\"link-embed__thumbnail allow-inline-style\" style=\"background-image:url(https:\/\/specials-images.forbesimg.com\/imageserve\/5e66cbd8e1e6170007593a74\/960x0.jpg?cropX1=556&amp;cropX2=3536&amp;cropY1=624&amp;cropY2=2300)\"\/><\/span><\/p>\n<p><a rel=\"nofollow\" class=\"color-link\" href=\"https:\/\/1password.com\/blog\/sms-based-mfa-risks\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-ga-track=\"ExternalLink:https:\/\/1password.com\/blog\/sms-based-mfa-risks\" aria-label=\"You should stop using SMS one-time codes\">You should stop using SMS one-time codes<\/a>. These are the weaker, traditional forms of MFA that Google and Microsoft dismiss in their passkey promotions. Authenticator apps are now easy to set up and use, and should replace SMS codes on all your key accounts. You then need to disable SMS codes completely.<\/p>\n<p>Passkey adoption is surging. But as Microsoft warns, these protections are only effective if users \u201celiminate phishable credentials entirely.\u201d Google\u2019s warning that passkeys alone are not a 100% solution is timely \u2014 especially as attackers shift toward recovery flows and fallback authentication methods.<\/p>\n<\/div>\n<p><br \/>\n<br \/><a href=\"https:\/\/www.forbes.com\/sites\/zakdoffman\/2026\/05\/11\/google-and-microsoft-warn-passkeys-may-not-stop-hackers\/\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Passkeys may not stop hackers. getty Passkeys are supposed to replace passwords and stop phishing attacks. But Google and Microsoft warn that passkeys alone are not enough if weaker recovery methods remain attached to accounts. \u201cEach account is only as secure as its weakest credential,\u201d Microsoft says, warning that passwords and SMS recovery options can<\/p>\n","protected":false},"author":1,"featured_media":12662,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[37],"tags":[],"class_list":{"0":"post-12661","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-brand-spotlights"},"_links":{"self":[{"href":"https:\/\/wildgreenquest.com\/index.php?rest_route=\/wp\/v2\/posts\/12661","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wildgreenquest.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wildgreenquest.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wildgreenquest.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/wildgreenquest.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=12661"}],"version-history":[{"count":0,"href":"https:\/\/wildgreenquest.com\/index.php?rest_route=\/wp\/v2\/posts\/12661\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wildgreenquest.com\/index.php?rest_route=\/wp\/v2\/media\/12662"}],"wp:attachment":[{"href":"https:\/\/wildgreenquest.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=12661"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wildgreenquest.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=12661"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wildgreenquest.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=12661"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}