Yubikey, Weaponization Thereof
The Weaponization of Yubikey - A Primer..., or, Why (Oh Why) Did I Take The Attractive Golden Key Shaped Device At That Trade Show? via Michael Allen, writing over at the fascinating Black Hills Information Security blog. Enjoy!
"Although the YubiKey is an excellent two-factor authentication device, it’s definitely missing a few features that would make it an ideal USB HID attack tool, and there are other products that already do the job much better. Probably the main strength of the YubiKey as an attack tool is that it looks like a YubiKey." - via Michael Allen, writing over at the always fascinating Black Hills Information Security blog.