Though there are other authentication dongles out there, YubiKeys are largely the face of the physical two-factor authentication movement. Unfortunately, to date it's also been unavailable for the ...
Over the last several years, Yubico has become close to ubiquitous in the field of hardware authentication. Its YubiKey token can act as a second layer of security for your online accounts and can ...
I stopped using passwords and switched to the same physical login protection Google uses internally for daily accounts.
Add articles to your saved list and come back to them any time. Warding off hackers with an extra layer of security, the new range of YubiKey 5 Series USB keys aim to lock away your secrets safe and ...
eSpeaks’ Corey Noles talks with Rob Israch, President of Tipalti, about what it means to lead with Global-First Finance and how companies can build scalable, compliant operations in an increasingly ...
All products featured here are independently selected by our editors and writers. If you buy something through links on our site, Mashable may earn an affiliate ...
Say “YubiKey” aloud, and you might get a sense of the intention of Yubico, the company behind this USB hardware-based authentication key that’s stormed the internet by being very clever and working ...
Yubico's YubiKey line has been a go-to choice for simple, hardware two-factor authentication for years. The final frontier for Yubico has been the iPhone, which it finally addresses with the YubiKey ...
Losing control of your online accounts is a nightmare, one that could lead to outright identity theft. The solution is multi-factor authentication (MFA), and with the $80 Yubico YubiKey Bio, you can ...
Yubico announced its plans to support Microsoft's Windows Hello platform back in September at the Ignite conference, with the goal of bringing strong, hardware-based authentication to Windows 10.
Yubico, a maker of hardware security keys, has unveiled its newest YubiKey 5C NFC, which the company says offers the strongest defenses against some of the most common cyberattacks. Security keys ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results