Archive
Stay up to date on company and partner news, product tips, and industry trends.
-
What is authentication assurance?
What is authentication assurance level 3? The NIST is on version 3 of the Authentication Assurance levels, called Authentication Assurance Level 3 (AAL3). Authentication Assurance relies on examination of the cryptographic modules of an authenticator. Level 3 requirements (AAL3) means that the code is within a tamper-proof container so that keys used in the cryptography are destroyed […]
Read more -
The security key bad hackers love to hate
How phishing works 1. User sees “real” information Successful phishing attacks use real information, seem like they’re coming from a real person or business, and create a sense of urgency to entice users to click. The most successful attacks focus on tricking the user into sharing information for a delivery or signing into an account. […]
Read more -
OATH – TOTP
What is OATH? Open Authentication (OATH) is an initiative addressing challenges making standard, open technology available to all. Learn more about OATH How to use OATH with the YubiKey? When using OATH with a YubiKey, the shared secrets are stored and processed in the YubiKey’s secure element. This has two advantages over storing secrets on […]
Read more -
Identifying your YubiKey
Current Products YubiKey Bio – FIDO Edition Years in operation: 2021-present Primary Functions: FIDO U2F, FIDO2Special capabilities: USB-A and biometric support YubiKey C Bio – FIDO Edition Years in operation: 2021-present Primary Functions: FIDO U2F, FIDO2Special capabilities: USB-C and biometric support YubiKey 5C NFC Years in operation: 2020-present Primary Functions: Secure Static Passwords, Yubico OTP, OATH – HOTP (Event), OATH – TOTP (Time), […]
Read more -
YubiKey Manager
Use the YubiKey Manager to configure FIDO2, OTP and PIV functionality on your YubiKey on Windows, macOS, and Linux operating systems. The tool works with any currently supported YubiKey. You can also use the tool to check the type and firmware of a YubiKey. In addition, you can use the extended settings to specify other […]
Read more -
Credential Stuffing
What are examples of credential stuffing?
Read more -
What is a YubiKey?
The authentication challenge Our mission is making secure login easy and available for everyone. Balancing security and usability has always been a challenge. And the more secure hardware authentication solutions are difficult to use and deploy. The YubiKey changes this. YubiKey is trusted by the world’s leading companies
Read more -
OATH – HOTP
How does HOTP work? HOTP is essentially an event-based one time password. Two inputs are required: the seed from the server and the counter from HOTP. The two sync each time a code is validated and the user gains access. What’s the difference between HOTP and TOTP? The biggest difference between HOTP and TOTP is that HOTP […]
Read more -
What is GDPR?
GDPR Defined GDPR stands for General Data Protection Regulation. The European Union and the EuropeanEconomic Area use it for data protection and privacy. Why is GDPR implemented? In April of 2016, GDPR was adopted by European parliament to replace an outdated data protection act. With our lives revolving around the internet and the web being […]
Read more -
What is eIDAS?
What is an eID? eID stands for Electronic Identification and it is a way to secure a person’s identity to access online services in the European Union. Where can security keys fit into this? Several European countries are now in the process of deploying modern web authentication, such as security keys to their citizens. Security […]
Read more