YubiKey NEO authentication token released
Posted on 08 November 2012.
Bookmark and Share
Yubico announced the production launch of the YubiKey NEO, a new authentication token that features Near Field Communications (NFC) technology, asymmetric cryptography support and mobile security with a single tap.


“To meet the growing market demand for high security PKI-based encryption and mobile access, we are pleased to launch the YubiKey NEO which uniquely combines the simplicity of our driverless One-Time Password and USB authentication technology with the superior security of PKI encryption, as well as wireless connectivity for mobile devices,” said Stina Ehrensvard, CEO and founder, Yubico. “This next generation, premium YubiKey is empowered with NXP state-of-the-art security technology and Common Criteria certified bank grade authentication ICs.”

“Password-based online authentication does not deliver enough security for cloud services. Hardware-based strong authentication technology is necessary to protect identities and privacy; not just in Cloud Services but all areas of cyber security applications”, says Sami Nassar, general manager, authentication product line at NXP Semiconductors.

“NXP already provides security for hundreds of millions of people using smart card-based bank cards, electronic passports and NFC–enabled phones and we are glad that the YubiKey NEO leverages our proven hardware-based security technology,” he added.

Combining a hardware token in addition to a smartphone is critical for true strong security and mitigates the risk of mobile malware. The rugged YubiKey NEO fits conveniently on a key-chain. When the device is tapped on a NFC-enabled smartphone, the phone reads a securely encrypted one-time password emitted by the YubiKey NEO – with no additional client software needed.

The YubiKey NEO features a secure element based on NXP’s SmartMX security technology and may also be used with asymmetric encryption. The YubiKey NEO may be used as a CCID compliant USB token, enabling easy integration for systems integrators and third-party PKI applications.





Spotlight

Attackers use reflection techniques for larger DDoS attacks

Posted on 17 April 2014.  |  Instead of using a network of zombie computers, newer DDoS toolkits abuse Internet protocols that are available on open or vulnerable servers and devices. This approach can lead to the Internet becoming a ready-to-use botnet for malicious actors.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Apr 18th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //