Yubikey, The Weaponization Thereof

Yubi.png

The Weaponization of Yubikey – A Primer…, or, Why (Oh Why) Did I Take The Attractive Golden Key Shaped Device At That Trade Show? via Michael Allen, writing over at the fascinating Black Hills Information Security blog. Enjoy!

“Although the YubiKey is an excellent two-factor authentication device, it’s definitely missing a few features that would make it an ideal USB HID attack tool, and there are other products that already do the job much better. Probably the main strength of the YubiKey as an attack tool is that it looks like a YubiKey.” – via Michael Allen, writing over at the always fascinating Black Hills Information Security blog.

*** This is a Security Bloggers Network syndicated blog from Infosecurity.US authored by Marc Handelman. Read the original post at: https://www.infosecurity.us/blog/2019/5/2/the-yubikey-weapon