How does HOTP work? HOTP is essentially an event-based one time password. Two inputs are required: the seed from the server and the counter from HOTP. The two sync each time a code is validated and the user gains access. What’s the difference between HOTP and TOTP? The biggest difference between HOTP and TOTP is that HOTP […]
Read moreGDPR Defined GDPR stands for General Data Protection Regulation. The European Union and the EuropeanEconomic Area use it for data protection and privacy. Why is GDPR implemented? In April of 2016, GDPR was adopted by European parliament to replace an outdated data protection act. With our lives revolving around the internet and the web being […]
Read moreWhat is an eID? eID stands for Electronic Identification and it is a way to secure a person’s identity to access online services in the European Union. Where can security keys fit into this? Several European countries are now in the process of deploying modern web authentication, such as security keys to their citizens. Security […]
Read moreHow do Biometrics work in a security key? Biometrics are biological measurements or physical characteristics. Once biometric data is obtained, like in a security key or example, it is then saved so it can be used for the future to authenticate into a device or application. Biometric fingerprint credentials are stored in the secure element that helps […]
Read moreWhat is Phishing? Phishing is the fraudulent practice of inducing people to reveal sensitive personal information such as credit card numbers and passwords. Phishing attackers send what appear to be legitimate communications by text, email, or other electronic communication from reputable companies and other trustworthy entities to lure users to phishing websites. These professional-looking sites […]
Read moreWe just launched the new Ultimate YubiKey Experience pack, designed for anyone who wants to use a variety of YubiKey 5 Series form factors. The new pack delivers our five most popular devices, and also the addition of an unboxing experience like never before, complete with a ‘Y’ book featuring extensive details about Yubico, our mission, […]
Read moreOur Historical Origins 1748 / Augustin Ehrensvard designs Sveaborg an innovative fortress to protect Sweden against Russia, and is later ennobled by the Swedish king for this work. The fortress is today listed as a UNESCO world heritage site. The 2000s / Our Beginnings 2007 / Yubico is founded Yubico is founded in Stockholm, Sweden […]
Read moreEasy-to-use, strong authentication All-in-one configurable security key With a simple touch, the multi-protocol YubiKey protects access to computers, networks, and online services. Easier and safer than authenticator apps No more reaching for your smartphone, or re-typing passcodes. Just plug in your YubiKey, tap, and it does the rest for you. Works with hundreds of services […]
Read moreThe first YubiKey was manufactured in Sweden in 2008. A few years later, part of our team moved from Stockholm to California, and we expanded our production capabilities to this part to the US West coast. It was a conscious choice to manufacture our products in the two democratic countries that were close to our […]
Read moreMaking the internet safer with modern authentication Not all MFA is created equal Stop phishing attacks and account takeovers before they start with modern, phishing-resistant multi-factor authentication (MFA). Stay ahead of evolving cyber threats and regulatory requirements with a proven solution which cannot be bypassed by malicious actors, unlike basic forms of MFA such as […]
Read more