Archive
Stay up to date on company and partner news, product tips, and industry trends.
-
YubiKey And The Route To USB-C
The USB-C standard has caused a lot of chatter among Apple users, some concerning the elegance of fewer wires but mostly from those that miss absent ports, such as HDMI and USB 3.0, on newer MacBooks. Yubico has received requests to join the USB-C evolution and release a USB-C compatible YubiKey. We have built a […]
Read more -
UK Becomes the First Government to Offer Secure Online Identities Based on FIDO U2F Standards
Compromised online identities have reached a level that has exposed the weaknesses in usernames and passwords as well as traditional software security solutions. Government services around the world have a growing demand for strong two-factor authentication, but traditional hardware technologies have been too costly and complicated to scale for most countries and internet users. The […]
Read more -
YubiKey and U2F at CES ShowStoppers – Yubico Demonstrates Mobile Contactless, Tokenless, and Passwordless Authentication
Yubico will be exhibiting at booth B-12 at ShowStoppers on Wednesday, January 6, 2016, 6-10 p.m., at the Wynn Las Vegas. Hacking, data loss, and identity theft is no longer just a concern to enterprises, but a threat that reaches everyone online. The time is now and the technology is here for consumers to protect […]
Read more -
Hello, SSO. It’s me, authentication
There’s a secret that single sign-on (SSO) never talks about. It’s called authentication. The SSO conversation starts without mentioning the assumption that the user is already logged in. A login that requires a password. Instead, SSO is quickly positioned to triumph over the dangers of weak and reused passwords. Many times, however, those same suspect passwords […]
Read more -
Ode to the value of Backup YubiKey(s)
A few weeks ago, I was in my hotel and reached into my pocket to get my YubiKey. Without it, I can’t log into certain email, CMS or other systems without going through an involved IT administrative process. The key was gone. That is an instantaneous bad feeling, wiped away only by the backup YubiKey […]
Read more -
We Love Third-Party Validation!
It’s always rewarding when you see third-party validation of your company’s product, and that is why today started off so well. In separate articles published today, Yubico’s YubiKey was highlighted for its tight security and ease of use by authors Don Sambandaraksa at TelecomAsia.net, which is aimed at the telecom market, and Greg Harvey, co-founder […]
Read more -
YubiKey & BadUSB
Updated Oct. 22, 2014 to include information on Security Key We have received a few questions with regards to “BadUSB” concept and the YubiKey, presented at BlackHat 2014. This was picked up by wired.com, where the problem domain is somewhat expanded into a claim that the “Security of USB Is Fundamentally Broken”. Although there are a few […]
Read more -
Lost YubiKey Best Practices
We hope that you will not lose your YubiKey, but for larger deployments and serious use, establishing processes around lost YubiKeys is an important and challenging aspect. Yubico has offered the YubiRevoke service to help with this aspect, which is a centralized way to disable YubiKeys validated through the YubiCloud. Initially we thought this was […]
Read more -
Improving YubiKey Physical Security
Yubico has been working with world-renowed cryptographers at the Ruhr-Universität Bochum to improve resistance against physical attacks directed at the YubiKey. This has been ongoing process over the last year. The results were made public at the RAID2013 conference, and have also been presented at 30C3. To follow our principles of openness and transparency, we will […]
Read more -
CERN Research Secured with YubiKey
Read about how CERN is using YubiKeys in eWeek CERN, the European Organization for Nuclear Research, pioneers of the World Wide Web and one of the world’s leading scientific research centers, uses YubiKeys for securing critical services. “The YubiKey meets all our requirements thanks to its simplicity of use, its open algorithm and the available […]
Read more