Select the YubiKey security key

YubiKey Blog

New challenges and threats of modern cyberspace in the era of ChatGPT: how is the criminal’s portrait changing?

OpenAI introduced GPT chat version 3 in late 2022, based on large language models. He knew how to hold a conversation like a real person, communicate in many languages, pass exams, write software code and even blog. Already after 2 months, the number of his supporters...

Cybersecurity outsourcing – is it really dangerous and expensive?

Cybersecurity is a constant race against the clock: hackers find vulnerable chains and try to gain access to confidential information, while security experts build security systems that attackers try to break into after a while. And this happens all the time....

What businesses need to know about information security – an overview of technical tools

Unauthorised access to personal information, financial accounts or trade secrets can cause a lot of damage. This can lead to large losses due to the loss of reputation and financial assets, violation of user privacy, etc. Therefore, every person, organisation, business or financial institution must take care of data protection.

How the YubiKey protects against brute-force attacks: technicalities of attacks and key encryption

How the YubiKey protects against brute-force attacks: technicalities of attacks and key encryptionBrute force attacks are one of the most common hacking methods. It is considered one of the simplest, because in fact, in order to start an attack, an attacker only needs...

How to choose a quality USB token or security key

What is a USB token and how to use itThe concept of a USB token Since protecting accounts with a login and password has long been outdated, back in the early 2000s, many manufacturers began to offer USB tokens as an alternative solution. These are hardware keys for...

Two-factor authentication

Two-factor authentication Two-factor authentication In the modern world of computer tech, when it comes to information and personal data protection the use of passwords only is no longer reliable. It’s no secret, that even complex combinations of words, digits and...

Yubikey smart card mode without additional equipment

The idea of the first smart card was patented by the French inventor Roland Moreno back in 1974. Today, we already use this technology every day and cannot imagine how we can do without it: SIM cards, electronic travel tickets and passports, keys to hotel rooms, employee passes of closed enterprises, and bank payment cards work in smart card mode.

As a security key Yubikey protects against phishing attacks

As a security key Yubikey protects against phishing attacksPhishing (from the word “fishing”) or a phishing attack is one of the most dangerous and at the same time common social engineering methods used by cybercriminals. It is based on mass mailings of e-mails and...

How to protect your password from theft

The password is the first degree or first factor of protection against account hacking. It's very important to take care of its security, because if hackers steal your password, your personal data, documents, important correspondence and much more will be at risk. In...

What is multifactor authentication?

What is multifactor authentication? What is multifactor authentication and when is it appropriate to use it Account protection with the help of one factor – a complex password – ceased to be reliable about two decades ago. Therefore, network users are recommended to...

How to protect your account from hacking – the most relevant security measures

How to protect your account from hacking – the most relevant security measures How to protect your account from hacking – the most relevant security measures Fraud and theft of data on the network is a fairly common problem for both ordinary users and corporations....

What is multifactor authentication?

What is multifactor authentication? What is multifactor authentication and when is it appropriate to use it Account protection with the help of one factor – a complex password – ceased to be reliable about two decades ago. Therefore, network users are recommended to...

read more

No Results Found

The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.

More about YubiKey products

YubiKey 5 series

YubiKey FIPS series

Security Key

YubiKey Bio series

YubiHSM 2

Compatible with Yubikey

Useful Information

No Results Found

The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.

Online store

All categories

Getting to know the YubiKey

YubiKey for developers

YubiKey for private individuals

Pick up the YubiKey

Compare YubiKey

Buy online

Knowledge base

Thesaurus

Compatible with YubiKey

Documentation

Price List

Downloads

Stay up to date with the latest news and updates

Compatible with YubiKey

There are more and more services that support YubiKey keys. You can track new services in our directory and view compatible protocols, browsers, operating systems and settings.

Cybersecurity thesaurus

Every industry has a set of new terms. We try to write in such a way that our instructions or articles are easy and understandable, but sometimes specific concepts cannot be dispensed with. And it doesn’t hurt to understand the types of dangers and means of protection. So we have created for you a page with useful and informative information with a list of basic concepts, which will be constantly updated.

We are on social networks

Subscribe to our social media pages, so you don’t miss out on cybersecurity news, or new products and promotions in our online store.