Archive
Stay up to date on company and partner news, product tips, and industry trends.
-
Identifying your YubiKey
Current Products YubiKey Bio – FIDO Edition Years in operation: 2021-present Primary Functions: FIDO U2F, FIDO2Special capabilities: USB-A and biometric support YubiKey C Bio – FIDO Edition Years in operation: 2021-present Primary Functions: FIDO U2F, FIDO2Special capabilities: USB-C and biometric support YubiKey 5C NFC Years in operation: 2020-present Primary Functions: Secure Static Passwords, Yubico OTP, OATH – HOTP (Event), OATH – TOTP (Time), […]
Read more -
YubiKey Manager
Use the YubiKey Manager to configure FIDO2, OTP and PIV functionality on your YubiKey on Windows, macOS, and Linux operating systems. The tool works with any currently supported YubiKey. You can also use the tool to check the type and firmware of a YubiKey. In addition, you can use the extended settings to specify other […]
Read more -
Credential Stuffing
What are examples of credential stuffing?
Read more -
What is a YubiKey?
The authentication challenge Our mission is making secure login easy and available for everyone. Balancing security and usability has always been a challenge. And the more secure hardware authentication solutions are difficult to use and deploy. The YubiKey changes this. YubiKey is trusted by the world’s leading companies
Read more -
OATH – HOTP
How does HOTP work? HOTP is essentially an event-based one time password. Two inputs are required: the seed from the server and the counter from HOTP. The two sync each time a code is validated and the user gains access. What’s the difference between HOTP and TOTP? The biggest difference between HOTP and TOTP is that HOTP […]
Read more -
What is GDPR?
GDPR Defined GDPR stands for General Data Protection Regulation. The European Union and the EuropeanEconomic Area use it for data protection and privacy. Why is GDPR implemented? In April of 2016, GDPR was adopted by European parliament to replace an outdated data protection act. With our lives revolving around the internet and the web being […]
Read more -
What is eIDAS?
What is an eID? eID stands for Electronic Identification and it is a way to secure a person’s identity to access online services in the European Union. Where can security keys fit into this? Several European countries are now in the process of deploying modern web authentication, such as security keys to their citizens. Security […]
Read more -
What are Biometrics?
How do Biometrics work in a security key? Biometrics are biological measurements or physical characteristics. Once biometric data is obtained, like in a security key or example, it is then saved so it can be used for the future to authenticate into a device or application. Biometric fingerprint credentials are stored in the secure element that helps […]
Read more -
What is phishing?
What is Phishing? Phishing is the fraudulent practice of inducing people to reveal sensitive personal information such as credit card numbers and passwords. Phishing attackers send what appear to be legitimate communications by text, email, or other electronic communication from reputable companies and other trustworthy entities to lure users to phishing websites. These professional-looking sites […]
Read more -
The Ultimate YubiKey Experience pack, and your chance to win one!
We just launched the new Ultimate YubiKey Experience pack, designed for anyone who wants to use a variety of YubiKey 5 Series form factors. The new pack delivers our five most popular devices, and also the addition of an unboxing experience like never before, complete with a ‘Y’ book featuring extensive details about Yubico, our mission, […]
Read more