Tag: phishing

What is DNS Spoofing?

What is a DNS Server? To start out, a DNS server is a sort of classification system for domains on the internet. If a user is searching for yubico.com, the job of the DNS is to go out and find the IP address for that domain so the user can access the correct site. How

What is a Brute Force Attack?

What are the goals of a brute force attack? The ultimate goal of a brute force attack is to steal password and login credentials to gain access to online accounts. After an attacker gains access it doesn’t stop there. They may use accounts to send out spam or phishing messages to other users. Another action

Credential Stuffing

What are examples of credential stuffing?

What is DFARS?

DFARS DFARS stands for Defense Federal Acquisition Regulation Supplement. The Department of Defense uses it to protect confidential information. Why is DFARS implemented? Government employees and contractors are likely to be targeted by hackers and nation-states, so authentication solutions need to be resistant to phishing and account takeovers, and comply with federal regulations. DFARS provides a

What is phishing?

What is Phishing? Phishing is the fraudulent practice of inducing people to reveal sensitive personal information such as credit card numbers and passwords. Phishing attackers send what appear to be legitimate communications by text, email, or other electronic communication from reputable companies and other trustworthy entities to lure users to phishing websites. These professional-looking sites

Enable secure privileged access management

Watch the webinar Learn why securing privileged users and accounts with phishing-resistant multi-factor authentication (MFA) is a critical need across the industry. Modern privileged access management Privileged access management is critical, as these users are prime targets for cybercriminals. The YubiKey ensures that all privileged users follow a higher bar of security, in turn protecting


Improve your company’s cyber security training with top tips from a behavioral researcher

Today marks the final stretch of National Cyber Security Awareness Month (NCSAM), and for the final week, we decided to sit down with Sal Aurigemma, PhD, Associate Professor of Computer Information Systems at the University of Tulsa, to get his take on enterprise security training.  As with many other things that have been impacted by COVID,


Atlassian unifies user authentication to improve employee productivity with YubiKeys

Atlassian uses YubiKeys to increase productivity, supporting a wide variety of MFA needs.


Oct 20, 2020

Internet security myth-busters: Debunking 3 common misconceptions about two-factor authentication

October is National Cyber Security Awareness Month and this year, it comes at a time when we are using online services more than ever. The pandemic has forced many of us to almost entirely rely on our digital identities to work, shop, learn, and generally keep in touch, putting the resilience of authentication technologies to the test. 


GitHub and Yubico pioneer U2F authentication globally

GitHub leverages self-service deployment to scale U2F authentication to developers worldwide.