Skip to content
Technology Security Information
  • Home
  • News
  • Security
  • Cyber Security
  • Threats

YubiKey Side-Channel Attack

Posted on September 6, 2024

There is a side-channel attack against YubiKey access tokens that allows someone to clone a device. It’s a complicated attack, requiring the victim’s username and password, and physical access to their YubiKey—as well as some technical expertise and equipment.

Still, nice piece of security analysis.

Posted in Security

Post navigation

Previous: GeoServer Vulnerability Targeted by Hackers to Deliver Backdoors and Botnet Malware
Next: Once You Go Curved, You’ll Never Go Back. This Samsung Monitor Is $300 off

Recent Posts

  • OneClik Malware Targets Energy Sector Using Microsoft ClickOnce and Golang Backdoors
  • From Detection to Prevention, Rethinking OT and IoT Security in a Hyperconnected Era 
  • ‘Squid Game’ Delivers a Harrowing, Heartbreaking Final Installment
  • ‘Cyber Fattah’ Hacktivist Group Leaks Saudi Games Data
  • Closing the Loop on API Security: How Imperva Helps You Expose, Contain, and Mitigate Business Logic Threats

Recent Comments

No comments to show.

Archives

  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023

Categories

  • Cyber Security
  • News
  • Security
  • Threats
  • Uncategorized

Related Posts

Black Basta ransomware gang hacked Hyundai Motor Europe

  • Security

Black Basta ransomware gang claims the hack of the car…

  • rooter
  • February 9, 2024
  • 2 min read
  • 0

UK, New Zealand against China-linked cyber operations

  • Security

UK, Australia and New Zealand are accusing China-linked threat actors…

  • rooter
  • March 26, 2024
  • 4 min read
  • 0

The Insecurity of Photo Cropping

  • Security

The Intercept has a long article on the insecurity of…

  • rooter
  • February 21, 2023
  • 1 min read
  • 0

Swiss Air Force sensitive files stolen in the hack of Ultra Intelligence & Communications

  • Security

Documents belonging to the Swiss Air Force were leaked on…

  • rooter
  • January 8, 2024
  • 2 min read
  • 0
Copyright © 2025 Technology Security Information Theme: Translucent Blog By Adore Themes.