{"id":51610,"date":"2023-04-24T14:41:00","date_gmt":"2023-04-24T14:41:00","guid":{"rendered":"http:\/\/78ae7bce-372c-40e1-b028-edd190adce81"},"modified":"2023-04-24T14:41:00","modified_gmt":"2023-04-24T14:41:00","slug":"gmail-app-passwords-what-they-are-how-to-create-one-and-why-to-use-them","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/gmail-app-passwords-what-they-are-how-to-create-one-and-why-to-use-them\/","title":{"rendered":"Gmail App Passwords: What they are, how to create one, and why to use them"},"content":{"rendered":"<figure class=\"c-shortcodeImage u-clearfix c-shortcodeImage-large\">\n<div class=\"c-shortcodeImage_imageContainer\">\n<div class=\"c-shortcodeImage_image\"><picture class=\"c-cmsImage c-cmsImage_loaded\"><source media=\"(max-width: 767px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/481861d24178952e9118a5d211d60f5426fa34f3\/2023\/04\/24\/87d6bf0b-1c9d-44d1-84b2-87227f3f98c5\/gettyimages-1235885447.jpg?auto=webp&amp;width=768\" alt=\"Gmail app on phone\"><source media=\"(max-width: 1023px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/069e659f5b246f2a6cb3ee774b1ce521f78099aa\/2023\/04\/24\/87d6bf0b-1c9d-44d1-84b2-87227f3f98c5\/gettyimages-1235885447.jpg?auto=webp&amp;width=1024\" alt=\"Gmail app on phone\"><source media=\"(max-width: 1440px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/242a04f64aec1a7dfc69d8e5370148beab004ee3\/2023\/04\/24\/87d6bf0b-1c9d-44d1-84b2-87227f3f98c5\/gettyimages-1235885447.jpg?auto=webp&amp;width=1280\" alt=\"Gmail app on phone\"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/img\/resize\/242a04f64aec1a7dfc69d8e5370148beab004ee3\/2023\/04\/24\/87d6bf0b-1c9d-44d1-84b2-87227f3f98c5\/gettyimages-1235885447.jpg?auto=webp&amp;width=1280\" alt=\"Gmail app on phone\" width=\"1280\" height=\"853.2479999999999\" fetchpriority=\"low\"><\/picture><\/div>\n<p> <!----><\/div>\n<p> <!----><figcaption> <span class=\"c-shortcodeImage_credit g-outer-spacing-top-xsmall u-block\">Photo Illustration by Thiago Prudencio\/SOPA Images\/LightRocket via Getty Images<\/span><\/figcaption><\/figure>\n<p>Gmail is one of the most <a href=\"https:\/\/statisticsanddata.org\/data\/most-popular-email-providers-in-history\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">widely used email services<\/a>&nbsp;on the planet. With millions of users and hundreds (or thousands) of third-party apps and services that are available to connect with Gmail, Google had to come up with a reliable method of securing those accounts. The first (most widely-used) part of that security comes by way of <a href=\"https:\/\/www.zdnet.com\/article\/two-factor-authentication-is-a-great-idea-but-not-enough-people-are-using-it\/\" rel=\"follow\">two-factor authentication (2FA)<\/a>, which should be considered a must-use for anyone who works with a Google account.<\/p>\n<p><strong>Also<\/strong>:&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/best-password-manager\/\" rel=\"follow\"><strong>The best password managers to easily maintain your logins<\/strong><\/a><\/p>\n<p>The problem with 2FA is that third-party apps aren&#8217;t always set up to authenticate with the added layer of security. That means if&nbsp; you have 2FA enabled for your Google account, connecting a third-party application or service won&#8217;t work with the standard username\/password combination.<\/p>\n<p>So Google created a feature to get around this problem called App Passwords.&nbsp;<\/p>\n<p><strong>Also:<\/strong> <a href=\"https:\/\/www.zdnet.com\/home-and-office\/work-life\/how-to-send-large-files-up-to-10gb-in-gmail\/\" rel=\"follow\"><strong>How to send really large files in Gmail<\/strong><\/a><\/p>\n<p>An app password is a password that is generated so that a third-party app can connect to your Gmail account. You then use it instead of your Google account password when using that app. It really is that simple. And for anyone who&#8217;s added 2FA to their Google accounts (which you most certainly should), the App Passwords feature is a necessity for connecting third-party apps and services.<\/p>\n<p>I&#8217;m going to show you how to use the App Passwords feature to generate an app password for Gmail. Just remember, this is only required if you have 2FA enabled for your Google account and if you need to connect a third-party app or service to Gmail. If you&#8217;re not in that situation, you don&#8217;t need to do this.<\/p>\n<h2>Creating an app password for Gmail<\/h2>\n<p><strong>What you&#8217;ll need:&nbsp;<\/strong>To create an app password, you&#8217;ll need a valid Gmail account. I&#8217;ll assume you do have 2FA enabled and are looking to connect an app to Gmail.<\/p>\n<div id=\"3521c49c-1242-45c1-a90f-ffa1b4b006bf\" class=\"c-shortcodeListicle g-outer-spacing-bottom-medium\">\n<div class=\"c-shortcodeListicle_conten\"><!----> <!----> <\/p>\n<div readability=\"6\">\n<div class=\"c-ShortcodeContent\" readability=\"32\">\n<p>The first thing to do is open a web browser and log in to your Google account.<\/p>\n<\/div>\n<\/div>\n<p> <!----><\/div>\n<p> <!----> <!----><\/div>\n<div id=\"e133e153-f905-430c-90bd-227695c2d931\" class=\"c-shortcodeListicle g-outer-spacing-bottom-medium\">\n<div class=\"c-shortcodeListicle_conten\"><!----> <!----> <\/p>\n<div readability=\"9\">\n<div class=\"c-ShortcodeContent\" readability=\"38\">\n<p>At the bottom of the page, you should see two drop-downs, one titled &#8220;Select app&#8221; and the other &#8220;Select device.&#8221; Click the &#8220;Select app&#8221; drop-down and choose Other. You will then be prompted to name the app password. I would suggest naming the app password for the app or service you&#8217;ll use it for. After naming the app password, click GENERATE.<\/p>\n<\/div>\n<\/div>\n<p> <!----><\/div>\n<p> <!----> <!----><\/div>\n<figure class=\"c-shortcodeImage u-clearfix c-shortcodeImage-large c-shortcodeImage-hasCaption\">\n<div class=\"c-shortcodeImage_imageContainer\">\n<div class=\"c-shortcodeImage_image\"><picture class=\"c-cmsImage\"><!----> <img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/gmail-app-passwords-what-they-are-how-to-create-one-and-why-to-use-them\/\" alt=\"The Gmail App Password generator.\" width=\"1280\" height=\"226.56580937972768\" fetchpriority=\"low\"><\/picture><\/div>\n<\/p><\/div>\n<p> <!----><figcaption>\n<div class=\"c-shortcodeImage_caption g-inner-spacing-right-small g-color-black\" readability=\"6\">\n<div class=\"c-ShortcodeContent\" readability=\"32\">\n<p>Generating an app password for Gmail is quite simple.<\/p>\n<\/div>\n<\/div>\n<p> <span class=\"c-shortcodeImage_credit g-outer-spacing-top-xsmall u-block\">Screenshot by Jack Wallen\/ZDNET<\/span><\/figcaption><\/figure>\n<div id=\"15b94ff7-43d3-4a49-8290-a8c06a344f0e\" class=\"c-shortcodeListicle g-outer-spacing-bottom-medium\">\n<div class=\"c-shortcodeListicle_conten\"><!----> <!----> <\/p>\n<div readability=\"8\">\n<div class=\"c-ShortcodeContent\" readability=\"36\">\n<p>After you click GENERATE, a new pop-up window will appear giving your new app password. Copy that password so you can use it for the third-party app or service you want to connect to Gmail. Once you have the password copied, click DONE.<\/p>\n<\/div>\n<\/div>\n<p> <!----><\/div>\n<p> <!----> <!----><\/div>\n<p>It&#8217;s very important to understand that these app passwords can only be viewed once. After clicking DONE, you won&#8217;t be able to view the password again, which is why it&#8217;s important to copy the password and use it immediately. I would suggest not clicking DONE until you know the app password works for the app or service you want to connect to your Gmail.<\/p>\n<p><strong>Also:<\/strong> <a href=\"https:\/\/www.zdnet.com\/article\/how-to-completely-remove-your-data-from-lastpasss-servers-eventually\/\" rel=\"follow\"><strong>How to completely remove your data from LastPass&#8217;s servers (eventually)<\/strong><\/a><\/p>\n<p>If you disconnect an app or service from Gmail, you should also delete the app password by clicking the associated trash can icon in the App Passwords listing. It&#8217;s always better to be safe than sorry.<\/p>\n<p>And that&#8217;s all there is to creating a Gmail app password. If you don&#8217;t already have 2FA enabled for Gmail, I would highly recommend you do so.&nbsp;<\/p>\n<p><!---->READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/gmail-app-passwords-what-they-are-how-to-create-one-and-why-to-use-them\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>If third-party apps need to connect to your Gmail account, your regular Google account password may not be enough. Find out how to use the App Passwords feature and why.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-51610","post","type-post","status-publish","format-standard","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Gmail App Passwords: What they are, how to create one, and why to use them 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/gmail-app-passwords-what-they-are-how-to-create-one-and-why-to-use-them\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Gmail App Passwords: What they are, how to create one, and why to use them 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/gmail-app-passwords-what-they-are-how-to-create-one-and-why-to-use-them\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-24T14:41:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/a\/img\/resize\/242a04f64aec1a7dfc69d8e5370148beab004ee3\/2023\/04\/24\/87d6bf0b-1c9d-44d1-84b2-87227f3f98c5\/gettyimages-1235885447.jpg?auto=webp&amp;width=1280\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/gmail-app-passwords-what-they-are-how-to-create-one-and-why-to-use-them\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/gmail-app-passwords-what-they-are-how-to-create-one-and-why-to-use-them\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Gmail App Passwords: What they are, how to create one, and why to use them\",\"datePublished\":\"2023-04-24T14:41:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/gmail-app-passwords-what-they-are-how-to-create-one-and-why-to-use-them\/\"},\"wordCount\":639,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/gmail-app-passwords-what-they-are-how-to-create-one-and-why-to-use-them\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.zdnet.com\/a\/img\/resize\/242a04f64aec1a7dfc69d8e5370148beab004ee3\/2023\/04\/24\/87d6bf0b-1c9d-44d1-84b2-87227f3f98c5\/gettyimages-1235885447.jpg?auto=webp&amp;width=1280\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/gmail-app-passwords-what-they-are-how-to-create-one-and-why-to-use-them\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/gmail-app-passwords-what-they-are-how-to-create-one-and-why-to-use-them\/\",\"name\":\"Gmail App Passwords: What they are, how to create one, and why to use them 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/gmail-app-passwords-what-they-are-how-to-create-one-and-why-to-use-them\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/gmail-app-passwords-what-they-are-how-to-create-one-and-why-to-use-them\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.zdnet.com\/a\/img\/resize\/242a04f64aec1a7dfc69d8e5370148beab004ee3\/2023\/04\/24\/87d6bf0b-1c9d-44d1-84b2-87227f3f98c5\/gettyimages-1235885447.jpg?auto=webp&amp;width=1280\",\"datePublished\":\"2023-04-24T14:41:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/gmail-app-passwords-what-they-are-how-to-create-one-and-why-to-use-them\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/gmail-app-passwords-what-they-are-how-to-create-one-and-why-to-use-them\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/gmail-app-passwords-what-they-are-how-to-create-one-and-why-to-use-them\/#primaryimage\",\"url\":\"https:\/\/www.zdnet.com\/a\/img\/resize\/242a04f64aec1a7dfc69d8e5370148beab004ee3\/2023\/04\/24\/87d6bf0b-1c9d-44d1-84b2-87227f3f98c5\/gettyimages-1235885447.jpg?auto=webp&amp;width=1280\",\"contentUrl\":\"https:\/\/www.zdnet.com\/a\/img\/resize\/242a04f64aec1a7dfc69d8e5370148beab004ee3\/2023\/04\/24\/87d6bf0b-1c9d-44d1-84b2-87227f3f98c5\/gettyimages-1235885447.jpg?auto=webp&amp;width=1280\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/gmail-app-passwords-what-they-are-how-to-create-one-and-why-to-use-them\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Gmail App Passwords: What they are, how to create one, and why to use them\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Gmail App Passwords: What they are, how to create one, and why to use them 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/gmail-app-passwords-what-they-are-how-to-create-one-and-why-to-use-them\/","og_locale":"en_US","og_type":"article","og_title":"Gmail App Passwords: What they are, how to create one, and why to use them 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/gmail-app-passwords-what-they-are-how-to-create-one-and-why-to-use-them\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-04-24T14:41:00+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/a\/img\/resize\/242a04f64aec1a7dfc69d8e5370148beab004ee3\/2023\/04\/24\/87d6bf0b-1c9d-44d1-84b2-87227f3f98c5\/gettyimages-1235885447.jpg?auto=webp&amp;width=1280","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/gmail-app-passwords-what-they-are-how-to-create-one-and-why-to-use-them\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/gmail-app-passwords-what-they-are-how-to-create-one-and-why-to-use-them\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Gmail App Passwords: What they are, how to create one, and why to use them","datePublished":"2023-04-24T14:41:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/gmail-app-passwords-what-they-are-how-to-create-one-and-why-to-use-them\/"},"wordCount":639,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/gmail-app-passwords-what-they-are-how-to-create-one-and-why-to-use-them\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/242a04f64aec1a7dfc69d8e5370148beab004ee3\/2023\/04\/24\/87d6bf0b-1c9d-44d1-84b2-87227f3f98c5\/gettyimages-1235885447.jpg?auto=webp&amp;width=1280","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/gmail-app-passwords-what-they-are-how-to-create-one-and-why-to-use-them\/","url":"https:\/\/www.threatshub.org\/blog\/gmail-app-passwords-what-they-are-how-to-create-one-and-why-to-use-them\/","name":"Gmail App Passwords: What they are, how to create one, and why to use them 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/gmail-app-passwords-what-they-are-how-to-create-one-and-why-to-use-them\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/gmail-app-passwords-what-they-are-how-to-create-one-and-why-to-use-them\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/242a04f64aec1a7dfc69d8e5370148beab004ee3\/2023\/04\/24\/87d6bf0b-1c9d-44d1-84b2-87227f3f98c5\/gettyimages-1235885447.jpg?auto=webp&amp;width=1280","datePublished":"2023-04-24T14:41:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/gmail-app-passwords-what-they-are-how-to-create-one-and-why-to-use-them\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/gmail-app-passwords-what-they-are-how-to-create-one-and-why-to-use-them\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/gmail-app-passwords-what-they-are-how-to-create-one-and-why-to-use-them\/#primaryimage","url":"https:\/\/www.zdnet.com\/a\/img\/resize\/242a04f64aec1a7dfc69d8e5370148beab004ee3\/2023\/04\/24\/87d6bf0b-1c9d-44d1-84b2-87227f3f98c5\/gettyimages-1235885447.jpg?auto=webp&amp;width=1280","contentUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/242a04f64aec1a7dfc69d8e5370148beab004ee3\/2023\/04\/24\/87d6bf0b-1c9d-44d1-84b2-87227f3f98c5\/gettyimages-1235885447.jpg?auto=webp&amp;width=1280"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/gmail-app-passwords-what-they-are-how-to-create-one-and-why-to-use-them\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Gmail App Passwords: What they are, how to create one, and why to use them"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/51610","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=51610"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/51610\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=51610"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=51610"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=51610"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}