The first dual connector YubiKey, supporting USB-C and Lightning connectors.
Read moreProven security at scale Stop account Takeovers YubiKeys are trusted by the world’s largest companies and users have experienced 0 account takeovers. Learn More Easy to Setup and Support It’s as easy as USB! Access your accounts 4x faster than other 2FA, and cut support calls by 92% Learn More Purpose-built for Security Unlike other […]
Read moreHow is a ModHex static password generated? Utilizing ModHex and its 16-character alphabet, and encoding that introduces a measure of “randomness”. A 32-character ModHex password would take a hacker around five billion years to even get a 1 in 2,158,056,614 chance of a correct guess (yes, that’s two billion!). Even a 16-character ModHex password would take around […]
Read moreWhat is PGP? Pretty Good Privacy, commonly referred to as PGP, is an encryption program developed by Phil Zimmerman in 1991, originally to enable secure communication between anti-nuclear activists via bulletin board systems (BBSs). What is GPG? GPG, also known as GnuPG, is a complete and free implementation of the OpenPGP standard. The YubiKey follows […]
Read moreIn order to protect against modern cyber attacks on critical infrastructure and the software supply chain, security solutions need to modernize. Learn how to implement phishing-resistant MFA and safeguard the supply chain with Yubico solutions.
Read moreWhat is authentication assurance level 3? The NIST is on version 3 of the Authentication Assurance levels, called Authentication Assurance Level 3 (AAL3). Authentication Assurance relies on examination of the cryptographic modules of an authenticator. Level 3 requirements (AAL3) means that the code is within a tamper-proof container so that keys used in the cryptography are destroyed […]
Read moreWhat is OATH? Open Authentication (OATH) is an initiative addressing challenges making standard, open technology available to all. Learn more about OATH How to use OATH with the YubiKey? When using OATH with a YubiKey, the shared secrets are stored and processed in the YubiKey’s secure element. This has two advantages over storing secrets on […]
Read moreCurrent Products YubiKey Bio – FIDO Edition Years in operation: 2021-present Primary Functions: FIDO U2F, FIDO2Special capabilities: USB-A and biometric support YubiKey C Bio – FIDO Edition Years in operation: 2021-present Primary Functions: FIDO U2F, FIDO2Special capabilities: USB-C and biometric support YubiKey 5C NFC Years in operation: 2020-present Primary Functions: Secure Static Passwords, Yubico OTP, OATH – HOTP (Event), OATH – TOTP (Time), […]
Read moreUse the YubiKey Manager to configure FIDO2, OTP and PIV functionality on your YubiKey on Windows, macOS, and Linux operating systems. The tool works with any currently supported YubiKey. You can also use the tool to check the type and firmware of a YubiKey. In addition, you can use the extended settings to specify other […]
Read moreWhat are examples of credential stuffing?
Read more