The workspace showcases its Scandinavian design with light and greenery. Scandinavian hardware security firm Yubico AB is expanding in Singapore, opening a regional hub to customise and distribute its ...
Yubico AB, a Swedish tech company that makes the YubiKey, has opened a new global headquarters in Singapore. A YubiKey is a ...
Popular social network X (aka Twitter) is having significant issues with users unable to log in. This is our ongoing coverage and status updates of the situation. Of course, when you try to do the ...
Until now, YubiKey-as-a-Service -- Yubico's provisioning and delivery offering -- was available only in a handful of countries, due primarily to various local logistics and delivery challenges. Today, ...
A security vulnerability in an Infineon crypto library can be abused with physical possession and expensive equipment to access secrets from Yubikeys, for example. heise online asked Yubico how the ...
NinjaLab, a security research company, has discovered a vulnerability that would allow bad actors to clone YubiKeys. As the company has explained in a security advisory, NinjaLab found a vulnerability ...
Attackers can exploit a security vulnerability in Yubikey and YubiSHM from Yubico and access keys. However, this requires a lot of effort. IT security researchers have discovered a security ...
When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works. All physical multi-factor authentication (MFA) keys that work on Infeneon’s SLE78 microcontroller ...
Casa, a leading provider of Bitcoin self-custody services, has announced an integration with YubiKeys, enabling users to secure their Bitcoin vaults with Yubikeys. YubiKeys are small physical devices ...
New security keys are needed to benefit from the improved firmware as existing hardware can’t be updated. New security keys are needed to benefit from the improved firmware as existing hardware can’t ...
When it comes to user authentication, there are many options available, from passwords at the weaker end of the security spectrum to hardware keys at the other. But what if the hardware security key ...