The device supports universal second-factor authentication and passwordless login, offering an alternative to proprietary ...
The YubiKey 5, the most widely used hardware token for two-factor authentication based on the FIDO standard, contains a cryptographic flaw that makes the finger-size device vulnerable to cloning when ...
The YubiKey Bio Series reimagines biometric authentication on a security key. Its three chip architecture allows the biometric fingerprint material to be stored in a separate secure element which ...
NinjaLab, a security research company, has discovered a vulnerability that would allow bad actors to clone YubiKeys. As the company has explained in a security advisory, NinjaLab found a vulnerability ...
Posts from this topic will be added to your daily email digest and your homepage feed. The vulnerability impacts almost all older YubiKey security tokens. The vulnerability impacts almost all older ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results