Cybersecurity outsourcing – is it really dangerous and expensive?
Cybersecurity is a constant race against the clock: hackers find vulnerable chains and try to gain access to confidential information, while security experts build security systems that attackers...
New challenges and threats of modern cyberspace in the era of ChatGPT: how is the criminal’s portrait changing?
OpenAI introduced GPT chat version 3 in late 2022, based on large language models. He knew how to hold a conversation like a real person, communicate in many languages, pass exams, write software code and even blog. Already after 2 months, the number of his supporters...
What businesses need to know about information security – an overview of technical tools
Unauthorised access to personal information, financial accounts or trade secrets can cause a lot of damage. This can lead to large losses due to the loss of reputation and financial assets, violation of user privacy, etc. Therefore, every person, organisation, business or financial institution must take care of data protection.
How the YubiKey protects against brute-force attacks: technicalities of attacks and key encryption
How the YubiKey protects against brute-force attacks: technicalities of attacks and key encryptionBrute force attacks are one of the most common hacking methods. It is considered one of the simplest, because in fact, in order to start an attack, an...
More about YubiKey products
YubiKey 5 series
YubiKey FIPS series
Security Key
YubiKey Bio series
YubiHSM 2
Compatible with Yubikey
Useful Information
YubiKey Smart Card Mode on macOS – convenient authentication for developers
Smart cards have been very popular for many years as a reliable means of identification, authentication, and authorization in businesses and educational institutions. They come in a variety of form factors: from a SIM card on a phone to a plastic card. However, if you...
OTP passwords on YubiKey — how it works
OTP passwords are one-time passwords (the origin of OTP is from English one time password) that are used for one authentication session. Their effect is usually limited by time. You may have received such codes by phone or mail when trying to access online banking or...
How to protect yourself from phishing with YubiKey on Binance
Binance is one of the largest and most popular cryptocurrency exchanges in the world. With its help, you can monitor the movements of the cryptocurrency market, invest in digital assets and conduct trading operations in real time. Of course, in order to use the...
Yubico Authenticator – User Guide
This guide is designed to help you set up your YubiKeys on any services that offer two-factor authentication connections using authenticator programs that generate codes.
All categories
Getting to know the YubiKey
YubiKey for developers
YubiKey for private individuals
Pick up the YubiKey
Compare YubiKey
Buy online
Knowledge base
Thesaurus
Compatible with YubiKey
Documentation
Price List
Downloads
Stay up to date with the latest news and updates
Compatible with YubiKey
There are more and more services that support YubiKey keys. You can track new services in our directory and view compatible protocols, browsers, operating systems and settings.
Cybersecurity thesaurus
Every industry has a set of new terms. We try to write in such a way that our instructions or articles are easy and understandable, but sometimes specific concepts cannot be dispensed with. And it doesn’t hurt to understand the types of dangers and means of protection. So we have created for you a page with useful and informative information with a list of basic concepts, which will be constantly updated.
We are on social networks
Subscribe to our social media pages, so you don’t miss out on cybersecurity news, or new products and promotions in our online store.