Infosecurity.US

Information Security & Occasional Forays Into Adjacent Realms

  • Web Log

Yubikey, Weaponization Thereof

May 22, 2019 by Marc Handelman in Information Security, Hardware Secrets, Hardware Security

The Weaponization of Yubikey - A Primer..., or, Why (Oh Why) Did I Take The Attractive Golden Key Shaped Device At That Trade Show? via Michael Allen, writing over at the fascinating Black Hills Information Security blog. Enjoy!

"Although the YubiKey is an excellent two-factor authentication device, it’s definitely missing a few features that would make it an ideal USB HID attack tool, and there are other products that already do the job much better. Probably the main strength of the YubiKey as an attack tool is that it looks like a YubiKey." - via Michael Allen, writing over at the always fascinating Black Hills Information Security blog.

May 22, 2019 /Marc Handelman
Information Security, Hardware Secrets, Hardware Security
  • Newer
  • Older