Physical Address
304 North Cardinal St.
Dorchester Center, MA 02124
Physical Address
304 North Cardinal St.
Dorchester Center, MA 02124

Google announced in early April that it was launching a flowing tool that lets business users easily shipped “End to End to End” EmailsEmail attempts to address the long -term challenges to add additional security protection to email messages. The feature is currently in Bita for enterprise users to try in their own organization. Then it will extend to allow the transmitting emails to the end -to -end emails on any of the Google Workspace users Gmail By the end of the user year, the feature will allow workspace users to send more secure emails to any inbox. Email spam and digital fraud researchers have warned, though, the feature will provide a new option for email privacy and protection, it will inevitably create new phishing attacks.
End-to-end encryption is a protection that except the sender and recipient devices keep the data always scramble and the historic tihasik email is difficult to add to protocol. The methods of doing this are usually very complex and expensive for implementation and only refers to meeting specific consent requirements for large companies. In contrast, the end -to -end email tool from the end of Google is easy to use and it does not require a significant overhead. Digital fraud researchers are the most concerned about the scene that is related to the scene where a workspace user sends a non-zeimail user to an end-to-end email.
Google wrote in a blog post, “When the recipient is not a Gmail user, Gmail sends an invitation to view the E2E email in a limited version of their Gmail,” Google wrote in a blog post. “The recipient can then use the Google Workspace Account a guest to see and reply to the email safely.”
The fear is that scammers will take advantage of this new and more protected communication system that creates fake copies of these invitations so that there are contaminated links and prompt goals for entering their login credentials for their email, single sign-on services or other accounts.
“Looking at Google’s implementation, we can see that it introduced a new work flow for non-zeimail users-receiving a link to view an email,” said Jerem Segura, senior director of the Malwerbites Department. “Users may still not be familiar about what a valid invitation still looks like, which makes them more sensitive to click on a duplicate” “
Given the technical constraints of the email, Google has created a way to automatically manage keys for a company’s workspace – encrypted messages are used to desk. The key management is that the end -to -end encrypting email is so hard, so it is easy to provide a solution to customers that are currently available from what is available. The company’s workplace controls keys more than stored locally on the sender and recipient device that means this feature Does not qualify enough as the end encryption from the end In the strict sense of the word. However, researchers say that in the use of business consent, the equipment can still be extremely effective. And those people who want to end the end -to -end communications from the end should be used simply Aiming appThe
When Gmail users get one of the new encrypted emails from a Google Workspace user, broad array and fraud detection processes of Google’s dynamic spam filters will be effective against spam, phishing and mischievous impostors. However, users outside the Google Ecosystem will also be able to receive encrypted email invitations, which makes the service available for anyone, but non-google users will leave on their own device.