My recent feature on passkeys attracted significant interest, and a number of the 1,100-plus comments raised questions about how the passkey system actually works and if it can be trusted. In response, I’ve put together this list of frequently asked questions to dispel a few myths and shed some light on what we know—and don’t know—about passkeys. This FAQ will be updated from time to time to answer additional questions of merit, so check back regularly. This author will not be monitoring or responding to comments going forward but can still be contacted through email.


More

Global Security Mag: Credential Stuffing: Another String to the Hackers’ Arch

Focus on the credential stuffing threat, what it’s about, the risks associated and how to…

Read More →

Computerwoche: Security in the Financial Industry

Banks are a popular target for hackers. Biometric authentication methods could put a stop to…

Read More →

PC Mag UK: How to Protect Your Online Accounts With a Physical Security Key

You can also use the YubiKey as authentication to sign into a variety of websites,…

Read More →


Subscribe to the FIDO newsletter

Stay Connected, Stay Engaged

Receive the latest news, events, research and implementation guidance from the FIDO Alliance. Learn about digital identity and fast, phishing-resistant authentication with passkeys.