{"id":55008,"date":"2024-01-03T15:13:00","date_gmt":"2024-01-03T15:13:00","guid":{"rendered":"http:\/\/acc78d22-e343-4f93-aea6-4ab384240b07"},"modified":"2024-01-03T15:13:00","modified_gmt":"2024-01-03T15:13:00","slug":"i-added-a-hardware-security-key-to-my-macbook-and-it-made-my-logins-faster-and-safer","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/i-added-a-hardware-security-key-to-my-macbook-and-it-made-my-logins-faster-and-safer\/","title":{"rendered":"I added a hardware security key to my MacBook, and it made my logins faster and safer"},"content":{"rendered":"<figure class=\"c-shortcodeImage u-clearfix c-shortcodeImage-large\">\n<div class=\"c-shortcodeImage_imageContainer\">\n<div class=\"c-shortcodeImage_image\"><picture class=\"c-cmsImage c-cmsImage_loaded\"><source media=\"(max-width: 767px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/d268ddd051d61fafd165c13a86cba745a82537f1\/2023\/11\/01\/771b0c03-1e2d-4889-8527-fd3642783506\/dsc02309-enhanced-nr-2.jpg?auto=webp&amp;width=768\" alt=\"MacBook Air and MacBook Pro on Energy Yellow background\"><source media=\"(max-width: 1023px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/854fb861a70b72959a6cc5586e7dcf6853cac3de\/2023\/11\/01\/771b0c03-1e2d-4889-8527-fd3642783506\/dsc02309-enhanced-nr-2.jpg?auto=webp&amp;width=1024\" alt=\"MacBook Air and MacBook Pro on Energy Yellow background\"><source media=\"(max-width: 1440px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/d5fe83d100c643ec75050607d6b4f596cb2236f2\/2023\/11\/01\/771b0c03-1e2d-4889-8527-fd3642783506\/dsc02309-enhanced-nr-2.jpg?auto=webp&amp;width=1280\" alt=\"MacBook Air and MacBook Pro on Energy Yellow background\"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/img\/resize\/d5fe83d100c643ec75050607d6b4f596cb2236f2\/2023\/11\/01\/771b0c03-1e2d-4889-8527-fd3642783506\/dsc02309-enhanced-nr-2.jpg?auto=webp&amp;width=1280\" alt=\"MacBook Air and MacBook Pro on Energy Yellow background\" width=\"1280\" height=\"853.75\" fetchpriority=\"low\"><\/picture><\/div>\n<\/p><\/div>\n<p> <!----><figcaption> <span class=\"c-shortcodeImage_credit g-outer-spacing-top-xsmall u-block\">Jason Hiner\/ZDNET<\/span><\/figcaption><\/figure>\n<p>For the past few months, I&#8217;ve been alternating my laptop usage between a <a href=\"https:\/\/www.zdnet.com\/article\/microsoft-surface-pro-9-review\/\" rel=\"follow\">Surface Pro 9<\/a> (running Windows 11) and an <a href=\"https:\/\/www.zdnet.com\/article\/m2-macbook-air-zdnets-product-of-the-year\/\" rel=\"follow\">M2-powered MacBook Air<\/a>. There&#8217;s always a bit of an adjustment when switching between platforms, but I found one aspect of the MacBook especially frustrating: After a restart, I have to enter the local user account password before I can use the TouchID fingerprint recognition hardware. Can&#8217;t MacOS work more like Windows Hello, which lets me sign on anytime using biometrics or a PIN?<\/p>\n<p><strong>Also:&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/best-security-key\/\" rel=\"follow\">The best security keys: Expert tested and reviewed<\/a><\/strong><\/p>\n<p>Well, yes, it can! As long as you have the right hardware, that is.<\/p>\n<p>Specifically, you need a USB security key that supports the Personal Identity Verification (PIV) standard and can act as a smart card for login purposes. As it turns out, anything in the <span class=\"c-commerceLink\"><a href=\"https:\/\/www.amazon.com\/Yubico-YubiKey-USB-Authentication-Security\/dp\/B07HBD71HL?tag=zdnet-buy-button-20\" rel=\"noopener noreferrer nofollow\" target=\"_blank\"><span>YubiKey 5 series<\/span><!----><\/a><\/span> from Yubico meets these standards. Now, I just happen to have a few of these versatile keys hanging around, so I decided to make my MacBook a little easier to use, with their help.<\/p>\n<p>Here&#8217;s how I did it.<\/p>\n<p>I started with a <span class=\"c-commerceLink\"><a href=\"https:\/\/www.amazon.com\/Yubico-YubiKey-USB-Authentication-Security\/dp\/B07HBDX2CM\/?tag=zdnet-buy-button-20\" rel=\"noopener noreferrer nofollow\" target=\"_blank\"><span>YubiKey 5 Nano<\/span><!----><\/a><\/span>, which is a remarkably small gizmo that plugs into one of the MacBook&#8217;s two USB-C ports and sticks out just a tiny fraction of an inch. That&#8217;s it on the far right in this family photo of the YubiKey 5 series.<\/p>\n<figure class=\"c-shortcodeImage u-clearfix c-shortcodeImage-medium c-shortcodeImage-hasCaption\">\n<div class=\"c-shortcodeImage_imageContainer\">\n<div class=\"c-shortcodeImage_image\"><picture class=\"c-cmsImage\"><!----> <img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/i-added-a-hardware-security-key-to-my-macbook-and-it-made-my-logins-faster-and-safer\/\" alt=\"yubikey-series-5\" width=\"740\" height=\"225.21739130434784\" fetchpriority=\"low\"><\/picture><\/div>\n<p> <!----><\/div>\n<p> <!----><figcaption>\n<div class=\"c-shortcodeImage_caption g-inner-spacing-right-small g-color-black\" readability=\"6.5\">\n<div class=\"c-ShortcodeContent\" readability=\"33\">\n<p>For any modern MacBook, you can use one of these Series 5 YubiKeys with a USB Type-C connector<\/p>\n<\/div>\n<\/div>\n<p> <span class=\"c-shortcodeImage_credit g-outer-spacing-top-xsmall u-block\">Image credit: Yubico<\/span><\/figcaption><\/figure>\n<p>I could have used a more traditional key that&#8217;s designed to be plugged in and removed at the end of a session, but I was especially attracted to this device&#8217;s capability to remain plugged in without my having to carry it separately.<\/p>\n<p>The setup process is fairly straightforward and is documented in this Yubico support article, <a href=\"https:\/\/support.yubico.com\/hc\/en-us\/articles\/360016649059\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"c-regularLink\">&#8220;Using Your YubiKey as a Smart Card in MacOS.&#8221;<\/a> For these instructions, I assume you&#8217;re starting with a new hardware key that&#8217;s never been previously configured.<\/p>\n<h2>How to set up your YubiKey on MacOS<\/h2>\n<p>Step 1: Download the <a href=\"https:\/\/www.yubico.com\/support\/download\/yubikey-manager\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"c-regularLink\">YubiKey Manager app<\/a> and install it on the Mac.<\/p>\n<figure class=\"c-shortcodeImage u-clearfix c-shortcodeImage-medium c-shortcodeImage-hasCaption\">\n<div class=\"c-shortcodeImage_imageContainer\">\n<div class=\"c-shortcodeImage_image\"><picture class=\"c-cmsImage\"><!----> <img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/i-added-a-hardware-security-key-to-my-macbook-and-it-made-my-logins-faster-and-safer\/\" alt=\"yubikey-manager-app\" width=\"740\" height=\"525.7648546144121\" fetchpriority=\"low\"><\/picture><\/div>\n<\/p><\/div>\n<p> <!----><figcaption>\n<div class=\"c-shortcodeImage_caption g-inner-spacing-right-small g-color-black\" readability=\"6\">\n<div class=\"c-ShortcodeContent\" readability=\"32\">\n<p>Click PIN Management to configure the hardware key before using the Setup for MacOS option<\/p>\n<\/div>\n<\/div>\n<p> <span class=\"c-shortcodeImage_credit g-outer-spacing-top-xsmall u-block\">Screenshot by Ed Bott\/ZDNET<\/span><\/figcaption><\/figure>\n<div id=\"9c8dcafe-e0f1-4f9d-bf6d-19a3df0a0a79\" class=\"c-shortcodeListicle g-outer-spacing-bottom-medium\">\n<div class=\"c-shortcodeListicle_conten\"><!----> <!----> <\/p>\n<div readability=\"7.5\">\n<div class=\"c-ShortcodeContent\" readability=\"35\">\n<p>Open YubiKey Manager, click <strong>Applications<\/strong> &gt; <strong>PIV<\/strong>, and click <strong>PIN Management<\/strong>. Make the following changes:<\/p>\n<ul>\n<li><strong>Set a new PIN.<\/strong>&nbsp;Click&nbsp;<strong>Change PIN<\/strong>&nbsp;and change the default value of 123456 to a value of your choosing, between 6 and 8 characters. Use numbers only, as MacOS does not support non-numeric characters for a PIN. This is the value you will type to unlock your Mac.<\/li>\n<li><strong>Set a new PIN Unlock Key (PUK).<\/strong>&nbsp;Click&nbsp;<strong>Change PUK<\/strong>&nbsp;and change the default value from 12345678 to one of your choosing, between 6 and 8 characters (numbers only). Keep a record of this code in a safe place. If the wrong PIN is entered three consecutive times, the PIN is blocked, and entering the PUK is the only way to unblock it. If you can&#8217;t supply the correct PUK, or if you enter the wrong PUK three consecutive times, you&#8217;ll need to reset the hardware key and start over.<\/li>\n<li><strong>Set a new Management Key.<\/strong>&nbsp;Click&nbsp;<strong>Change Management Key<\/strong>&nbsp;and then click&nbsp;<strong>Generate<\/strong>&nbsp;to change the 48-character triple-DES key to a new random value. You&#8217;re not expected to remember this value, so also select the Protect with PIN checkbox here, and then click&nbsp;<strong>Finish<\/strong>.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<p> <!----><\/div>\n<p> <!----> <!----><\/div>\n<div id=\"80aef52d-4377-401b-ba46-50256af9e144\" class=\"c-shortcodeListicle g-outer-spacing-bottom-medium\">\n<div class=\"c-shortcodeListicle_conten\"><!----> <!----> <\/p>\n<div readability=\"11.5\">\n<div class=\"c-ShortcodeContent\" readability=\"43\">\n<p>Open YubiKey Manager, click&nbsp;<strong>Applications<\/strong>&nbsp;&gt;&nbsp;<strong>PIV<\/strong>, click&nbsp;<strong>Setup for MacOS<\/strong>, and then click&nbsp;<strong>Setup for MacOS<\/strong>. (Yes, that&#8217;s a second button with the same label as the previous one.)&nbsp;<\/p>\n<p>This process pairs your hardware key with the certificates associated with the PIV application, turning your key into a MacOS-compatible smart card. Confirm that you want to overwrite the existing values, then enter your PIN and click&nbsp;<strong>OK<\/strong>.<\/p>\n<\/div>\n<\/div>\n<p> <!----><\/div>\n<p> <!----> <!----><\/div>\n<div id=\"04bd137f-0b5d-4c25-a5b8-6c5fefa2fffe\" class=\"c-shortcodeListicle g-outer-spacing-bottom-medium\">\n<div class=\"c-shortcodeListicle_conten\"><!----> <!----> <\/p>\n<div readability=\"6.5\">\n<div class=\"c-ShortcodeContent\" readability=\"33\">\n<p>Remove the hardware key and reinsert it. MacOS will prompt you to associate the hardware key\/smart card with your user account. Click that notification to begin the pairing process.<\/p>\n<\/div>\n<\/div>\n<p> <!----><\/div>\n<p> <!----> <!----><\/div>\n<figure class=\"c-shortcodeImage u-clearfix c-shortcodeImage-large c-shortcodeImage-hasCaption\">\n<div class=\"c-shortcodeImage_imageContainer\">\n<div class=\"c-shortcodeImage_image\"><picture class=\"c-cmsImage\"><!----> <img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/i-added-a-hardware-security-key-to-my-macbook-and-it-made-my-logins-faster-and-safer\/\" alt=\"pair-yubikey-with-macos\" width=\"1280\" height=\"832.4353741496599\" fetchpriority=\"low\"><\/picture><\/div>\n<\/p><\/div>\n<p> <!----><figcaption>\n<div class=\"c-shortcodeImage_caption g-inner-spacing-right-small g-color-black\" readability=\"6\">\n<div class=\"c-ShortcodeContent\" readability=\"32\">\n<p>Click the notification in the upper right corner to pair your hardware key with MacOS<\/p>\n<\/div>\n<\/div>\n<p> <span class=\"c-shortcodeImage_credit g-outer-spacing-top-xsmall u-block\">Screenshot by Ed Bott\/ZDNET<\/span><\/figcaption><\/figure>\n<p>Pay close attention to the screens that follow. You&#8217;ll need to enter the hardware key&#8217;s PIN, followed by the password for your MacOS user account, followed by the password for your iCloud Keychain (which is probably the same as your account password).<\/p>\n<p>And that&#8217;s it. The next time you restart your MacBook, you can type your PIN instead of having to enter your password. That unlocks the TouchID fingerprint reader, which you can then use to sign in after you resume from sleep.<\/p>\n<p><strong>Also: <a href=\"https:\/\/www.zdnet.com\/article\/i-tried-two-passwordless-password-managers-and-i-was-seriously-impressed-by-one\/\" rel=\"follow\">I tried two passwordless password managers, and was seriously impressed by one<\/a><\/strong><\/p>\n<p>If the YubiKey isn&#8217;t inserted when you restart (or resume from a long sleep session), you&#8217;ll be prompted to enter your password. You can plug in the key to change that prompt and use your PIN instead.<\/p>\n<p>In this configuration, you can safely change your password to be longer. (Experts say it should be <a href=\"https:\/\/www.zdnet.com\/article\/how-long-is-the-perfect-password-youre-asking-the-wrong-question\/\" rel=\"follow\">at least 12 characters in length<\/a>, but feel free to change it to a passphrase that contains upper- and lower-case letters and at least one number.) You&#8217;ll still need to type that passphrase occasionally to make system-level changes, but you won&#8217;t need it to sign in to your MacBook.<\/p>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/i-added-a-hardware-security-key-to-my-macbook-and-it-made-my-logins-faster-and-safer\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>With the help of a hardware security key, you can configure your MacBook so that you can sign in with a PIN instead of having to type your password. Here&#8217;s how I did it.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-55008","post","type-post","status-publish","format-standard","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>I added a hardware security key to my MacBook, and it made my logins faster and safer 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/i-added-a-hardware-security-key-to-my-macbook-and-it-made-my-logins-faster-and-safer\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"I added a hardware security key to my MacBook, and it made my logins faster and safer 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/i-added-a-hardware-security-key-to-my-macbook-and-it-made-my-logins-faster-and-safer\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-03T15:13:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/a\/img\/resize\/d5fe83d100c643ec75050607d6b4f596cb2236f2\/2023\/11\/01\/771b0c03-1e2d-4889-8527-fd3642783506\/dsc02309-enhanced-nr-2.jpg?auto=webp&amp;width=1280\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/i-added-a-hardware-security-key-to-my-macbook-and-it-made-my-logins-faster-and-safer\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/i-added-a-hardware-security-key-to-my-macbook-and-it-made-my-logins-faster-and-safer\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"I added a hardware security key to my MacBook, and it made my logins faster and safer\",\"datePublished\":\"2024-01-03T15:13:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/i-added-a-hardware-security-key-to-my-macbook-and-it-made-my-logins-faster-and-safer\\\/\"},\"wordCount\":939,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/i-added-a-hardware-security-key-to-my-macbook-and-it-made-my-logins-faster-and-safer\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/d5fe83d100c643ec75050607d6b4f596cb2236f2\\\/2023\\\/11\\\/01\\\/771b0c03-1e2d-4889-8527-fd3642783506\\\/dsc02309-enhanced-nr-2.jpg?auto=webp&amp;width=1280\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/i-added-a-hardware-security-key-to-my-macbook-and-it-made-my-logins-faster-and-safer\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/i-added-a-hardware-security-key-to-my-macbook-and-it-made-my-logins-faster-and-safer\\\/\",\"name\":\"I added a hardware security key to my MacBook, and it made my logins faster and safer 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/i-added-a-hardware-security-key-to-my-macbook-and-it-made-my-logins-faster-and-safer\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/i-added-a-hardware-security-key-to-my-macbook-and-it-made-my-logins-faster-and-safer\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/d5fe83d100c643ec75050607d6b4f596cb2236f2\\\/2023\\\/11\\\/01\\\/771b0c03-1e2d-4889-8527-fd3642783506\\\/dsc02309-enhanced-nr-2.jpg?auto=webp&amp;width=1280\",\"datePublished\":\"2024-01-03T15:13:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/i-added-a-hardware-security-key-to-my-macbook-and-it-made-my-logins-faster-and-safer\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/i-added-a-hardware-security-key-to-my-macbook-and-it-made-my-logins-faster-and-safer\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/i-added-a-hardware-security-key-to-my-macbook-and-it-made-my-logins-faster-and-safer\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/d5fe83d100c643ec75050607d6b4f596cb2236f2\\\/2023\\\/11\\\/01\\\/771b0c03-1e2d-4889-8527-fd3642783506\\\/dsc02309-enhanced-nr-2.jpg?auto=webp&amp;width=1280\",\"contentUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/d5fe83d100c643ec75050607d6b4f596cb2236f2\\\/2023\\\/11\\\/01\\\/771b0c03-1e2d-4889-8527-fd3642783506\\\/dsc02309-enhanced-nr-2.jpg?auto=webp&amp;width=1280\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/i-added-a-hardware-security-key-to-my-macbook-and-it-made-my-logins-faster-and-safer\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"I added a hardware security key to my MacBook, and it made my logins faster and safer\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"I added a hardware security key to my MacBook, and it made my logins faster and safer 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/i-added-a-hardware-security-key-to-my-macbook-and-it-made-my-logins-faster-and-safer\/","og_locale":"en_US","og_type":"article","og_title":"I added a hardware security key to my MacBook, and it made my logins faster and safer 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/i-added-a-hardware-security-key-to-my-macbook-and-it-made-my-logins-faster-and-safer\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2024-01-03T15:13:00+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/a\/img\/resize\/d5fe83d100c643ec75050607d6b4f596cb2236f2\/2023\/11\/01\/771b0c03-1e2d-4889-8527-fd3642783506\/dsc02309-enhanced-nr-2.jpg?auto=webp&amp;width=1280","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/i-added-a-hardware-security-key-to-my-macbook-and-it-made-my-logins-faster-and-safer\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/i-added-a-hardware-security-key-to-my-macbook-and-it-made-my-logins-faster-and-safer\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"I added a hardware security key to my MacBook, and it made my logins faster and safer","datePublished":"2024-01-03T15:13:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/i-added-a-hardware-security-key-to-my-macbook-and-it-made-my-logins-faster-and-safer\/"},"wordCount":939,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/i-added-a-hardware-security-key-to-my-macbook-and-it-made-my-logins-faster-and-safer\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/d5fe83d100c643ec75050607d6b4f596cb2236f2\/2023\/11\/01\/771b0c03-1e2d-4889-8527-fd3642783506\/dsc02309-enhanced-nr-2.jpg?auto=webp&amp;width=1280","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/i-added-a-hardware-security-key-to-my-macbook-and-it-made-my-logins-faster-and-safer\/","url":"https:\/\/www.threatshub.org\/blog\/i-added-a-hardware-security-key-to-my-macbook-and-it-made-my-logins-faster-and-safer\/","name":"I added a hardware security key to my MacBook, and it made my logins faster and safer 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/i-added-a-hardware-security-key-to-my-macbook-and-it-made-my-logins-faster-and-safer\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/i-added-a-hardware-security-key-to-my-macbook-and-it-made-my-logins-faster-and-safer\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/d5fe83d100c643ec75050607d6b4f596cb2236f2\/2023\/11\/01\/771b0c03-1e2d-4889-8527-fd3642783506\/dsc02309-enhanced-nr-2.jpg?auto=webp&amp;width=1280","datePublished":"2024-01-03T15:13:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/i-added-a-hardware-security-key-to-my-macbook-and-it-made-my-logins-faster-and-safer\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/i-added-a-hardware-security-key-to-my-macbook-and-it-made-my-logins-faster-and-safer\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/i-added-a-hardware-security-key-to-my-macbook-and-it-made-my-logins-faster-and-safer\/#primaryimage","url":"https:\/\/www.zdnet.com\/a\/img\/resize\/d5fe83d100c643ec75050607d6b4f596cb2236f2\/2023\/11\/01\/771b0c03-1e2d-4889-8527-fd3642783506\/dsc02309-enhanced-nr-2.jpg?auto=webp&amp;width=1280","contentUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/d5fe83d100c643ec75050607d6b4f596cb2236f2\/2023\/11\/01\/771b0c03-1e2d-4889-8527-fd3642783506\/dsc02309-enhanced-nr-2.jpg?auto=webp&amp;width=1280"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/i-added-a-hardware-security-key-to-my-macbook-and-it-made-my-logins-faster-and-safer\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"I added a hardware security key to my MacBook, and it made my logins faster and safer"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/55008","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=55008"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/55008\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=55008"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=55008"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=55008"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}