Two-factor authentication is a quick, easy way to add extra security to your accounts (or password managers). For even more security and peace of mind, consider buying a hardware token like the ...
On Monday, the hardware authentication company Yubico is announcing a new generation of its physical YubiKey tokens that support password-less login. The Series 5 YubiKeys get this streamlined mojo ...
NinjaLab, a security research company, has discovered a vulnerability that would allow bad actors to clone YubiKeys. As the company has explained in a security advisory, NinjaLab found a vulnerability ...
Attackers can exploit a security vulnerability in Yubikey and YubiSHM from Yubico and access keys. However, this requires a lot of effort. IT security researchers have discovered a security ...
Over the last several years, Yubico has become close to ubiquitous in the field of hardware authentication. Its YubiKey token can act as a second layer of security for your online accounts and can ...
Let’s face it, using passwords to authenticate into a system is a broken mess. To be effective, passwords need to be unique, long, complex, and frequently changed, which may be acceptable in a tightly ...
Yubico, the maker of the popular YubiKey hardware two-factor authentication (2FA) token, has announced the launch of its iOS SDK. This allows developers to bake truly secure 2FA (read: not based on ...
A number of factors inspired me to take a closer look at the Yubikey. For starters, it is such a simple and elegant solution to two of the major problems the security industry is facing these days: ...
The Librem Key is a new hardware token for improving Linux security by adding a physical authentication factor to booting, login and disk decryption on supported systems. It also has some features ...
Two-factor authentication for GitHub repositories just got a little more universal. GitHub expanded its authentication system to support the FIDO Universal 2 nd Factor (U2F) standard in order to offer ...
Let’s face it, using passwords to authenticate into a system is a broken mess. To be effective, passwords need to be unique, long, complex, and frequently changed, which may be acceptable in a tightly ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results