Tag: security key


WebAuthn implementation: What’s what, why should you care and new updates from Yubico

When it comes to WebAuthn, there’s certainly no shortage of acronyms or protocols. But what do they mean, and which ones do you need to care about? Fret not – both clarity and help are available! In this blog, we’ll share tips on how to implement WebAuthn, as well as share news about java-webauthn-server library


Mitigation and incident response plans to help prevent ransomware attacks

We’ve all grown accustomed to a flood of ransomware attack  news almost every week, with no end in sight. The recent arrest of two Ukrainian ransomware attackers demonstrates that the White House is serious about going on the offensive against ransomware distributors. But often enforcement could end up being a game of whack-a-mole — hit


Introducing the Security Key C NFC by Yubico, with USB-C and NFC for modern, FIDO-based authentication

As more devices leverage USB-C, we’re happy to share that our Security Key Series is expanding to meet this need. Built with the trademark Yubico security and quality that you’ve grown to love, the blue Security Key C NFC is the latest key to join our Security Key Series.  Available for purchase today for $29


Security Key Series product brief

What is One-Time Password (OTP)?

How do one-time passwords work? OTPs are delivered in many ways, usually via an object the user carries with him, such as his mobile phone (using SMS or an app), a token with an LCD-display, or a security key. OTP technology is compatible with all major platforms (desktop, laptop, mobile) and legacy environments, making it a very

YubiKey 5 Series

Easy-to-use, strong authentication Strong two-factor Hardware authenticator as a second factor, in addition to a password, in a strong two factor authentication solution. Strong multi-factor Combination of a hardware authenticator with a PIN to secure high assurance requirements such as financial transactions or submitting a prescription. Passwordless Hardware authenticator delivering strong single factor authentication, replacing

What is cross-platform?

Cross-Platform meaning definition Why is it important to be cross-platform? It’s important to have or use a product that is cross-platform so that it can work with a wide variety of devices. If security keys are cross-platform a user can use one key across all their devices. Are Yubico products cross-platform? Yes, all Yubico products

What is a Brute Force Attack?

What are the goals of a brute force attack? The ultimate goal of a brute force attack is to steal password and login credentials to gain access to online accounts. After an attacker gains access it doesn’t stop there. They may use accounts to send out spam or phishing messages to other users. Another action

What is eIDAS?

What is an eID? eID stands for Electronic Identification and it is a way to secure a person’s identity to access online services in the European Union. Where can security keys fit into this? Several European countries are now in the process of deploying modern web authentication, such as security keys to their citizens. Security

What are Biometrics?

How do Biometrics work in a security key? Biometrics are biological measurements or physical characteristics. Once biometric data is obtained, like in a security key or example, it is then saved so it can be used for the future to authenticate into a device or application. Biometric fingerprint credentials are stored in the secure element that helps