Security news that informs and inspires

Archive

1 result for tag Token:

Dissecting Security Hardware at Black Hat and DEF CON

Get insights into how to assess security hardware, including experimentations in counterfeiting U2F authentication tokens, different weaknesses in the hardware components of encrypted USB keys and more.

USB Security, Token, Yubikey, Black Hat, Defcon