Nemeski@lemm.ee · 11 months agoYubiKeys are vulnerable to cloning attacks thanks to newly discovered side channelplus-squarearstechnica.comexternal-linkmessage-square3linkfedilinkarrow-up133arrow-down10
arrow-up133arrow-down1external-linkYubiKeys are vulnerable to cloning attacks thanks to newly discovered side channelplus-squarearstechnica.comNemeski@lemm.ee · 11 months agomessage-square3linkfedilink
BeaverMEnglish · 1 year agoEliminating enterprise risk: One phishing-resistant user at a timeplus-squarewww.yubico.comexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkEliminating enterprise risk: One phishing-resistant user at a timeplus-squarewww.yubico.comBeaverMEnglish · 1 year agomessage-square0linkfedilink
BeaverMEnglish · 1 year agoRed Hat Enterprise Linux 9.4 adds passkey support for centrally managed users, including YubiKeysplus-squarewww.yubico.comexternal-linkmessage-square0linkfedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkRed Hat Enterprise Linux 9.4 adds passkey support for centrally managed users, including YubiKeysplus-squarewww.yubico.comBeaverMEnglish · 1 year agomessage-square0linkfedilink
m-p{3}A · 1 year agoYubiKey 5.7 and Yubico Authenticator 7plus-squarewww.yubico.comexternal-linkmessage-square0linkfedilinkarrow-up118arrow-down11
arrow-up117arrow-down1external-linkYubiKey 5.7 and Yubico Authenticator 7plus-squarewww.yubico.comm-p{3}A · 1 year agomessage-square0linkfedilink