Nemeski@lemm.ee · 2 months agoYubiKeys are vulnerable to cloning attacks thanks to newly discovered side channelplus-squarearstechnica.comexternal-linkmessage-square3fedilinkarrow-up130arrow-down10
arrow-up130arrow-down1external-linkYubiKeys are vulnerable to cloning attacks thanks to newly discovered side channelplus-squarearstechnica.comNemeski@lemm.ee · 2 months agomessage-square3fedilink
Beaver@lemmy.caMEnglish · 4 months agoEliminating enterprise risk: One phishing-resistant user at a timeplus-squarewww.yubico.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkEliminating enterprise risk: One phishing-resistant user at a timeplus-squarewww.yubico.comBeaver@lemmy.caMEnglish · 4 months agomessage-square0fedilink
Beaver@lemmy.caMEnglish · 4 months agoRed Hat Enterprise Linux 9.4 adds passkey support for centrally managed users, including YubiKeysplus-squarewww.yubico.comexternal-linkmessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkRed Hat Enterprise Linux 9.4 adds passkey support for centrally managed users, including YubiKeysplus-squarewww.yubico.comBeaver@lemmy.caMEnglish · 4 months agomessage-square0fedilink
m-p{3}@lemmy.ca · 6 months agoYubiKey 5.7 and Yubico Authenticator 7plus-squarewww.yubico.comexternal-linkmessage-square0fedilinkarrow-up14arrow-down11
arrow-up13arrow-down1external-linkYubiKey 5.7 and Yubico Authenticator 7plus-squarewww.yubico.comm-p{3}@lemmy.ca · 6 months agomessage-square0fedilink