Tag: YubiKey

Home » YubiKey » Page 14
  • Yubico LogoYubiKey ManagerUse the YubiKey Manager to configure FIDO2, OTP and PIV functionality on your YubiKey on Windows, macOS, and Linux operating systems. The tool works with any currently supported YubiKey. You can also use the tool to check the type and firmware of a YubiKey. In addition, you can use the extended settings to specify other […]Read moreresourcesYubiKey
  • Yubico LogoWhat is Credential Stuffing?What are examples of credential stuffing?Read morepasswordlessphishingYubiKey
  • Yubico LogoWhat is a YubiKey?The authentication challenge Our mission is making secure login easy and available for everyone. Balancing security and usability has always been a challenge. And the more secure hardware authentication solutions are difficult to use and deploy. The YubiKey changes this. YubiKey is trusted by the world’s leading companiesRead moreauthenticationmultifactor authenticationYubiKey
  • Yubico LogoWhat is OATH – HOTP (Event)?How does HOTP work? HOTP is essentially an event-based one time password. Two inputs are required: the seed from the server and the counter from HOTP. The two sync each time a code is validated and the user gains access. What’s the difference between HOTP and TOTP? The biggest difference between HOTP and TOTP is that HOTP […]Read moreOTPyubico.comYubiKey
  • Yubico LogoWhat is GDPR?GDPR Defined GDPR stands for General Data Protection Regulation. The European Union and the EuropeanEconomic Area use it for data protection and privacy. Why is GDPR implemented? In April of 2016, GDPR was adopted by European parliament to replace an outdated data protection act. With our lives revolving around the internet and the web being […]Read moreFIDO U2F security keyU2FYubiKey
  • Yubico LogoWhat is eIDAS?What is an eID? eID stands for Electronic Identification and it is a way to secure a person’s identity to access online services in the European Union. Where can security keys fit into this? Several European countries are now in the process of deploying modern web authentication, such as security keys to their citizens. Security […]Read morecybersecurityeidassecurity keyYubiKey
  • Yubico LogoWhat are Biometrics?How do Biometrics work in a security key? Biometrics are biological measurements or physical characteristics. Once biometric data is obtained, like in a security key or example, it is then saved so it can be used for the future to authenticate into a device or application. Biometric fingerprint credentials are stored in the secure element that helps […]Read moreauthenticationbiometricssecurity keyYubiKey
  • Yubico LogoWhat is phishing?What is Phishing? Phishing is the fraudulent practice of inducing people to reveal sensitive personal information such as credit card numbers and passwords. Phishing attackers send what appear to be legitimate communications by text, email, or other electronic communication from reputable companies and other trustworthy entities to lure users to phishing websites. These professional-looking sites […]Read morehardwarephishingYubiKey
  • The Ultimate YubiKey Experience pack, and your chance to win one!We just launched the new Ultimate YubiKey Experience pack, designed for anyone who wants to use a variety of YubiKey 5 Series form factors. The new pack delivers our five most popular devices, and also the addition of an unboxing experience like never before, complete with a ‘Y’ book featuring extensive details about Yubico, our mission, […]Read moreExperience Packform factorYubiKey
  • Yubico LogoYubico Company TimelineOur Historical Origins 1748 / Augustin Ehrensvard designs Sveaborg an innovative fortress to protect Sweden against Russia, and is later ennobled by the Swedish king for this work. The fortress is today listed as a UNESCO world heritage site. The 2000s / Our Beginnings 2007 / Yubico is founded Yubico is founded in Stockholm, Sweden […]Read moreHistoryYubiKey