dsad

dsad

dsad

<div class="storyBody" data-component="lazyloadImages" data-lazyload-images-options='{"threshold":500}'>

<p>Hardware security keys, such as the <a data-component="externalLink" href="https://store.google.com/us/product/titan_security_key" rel="noopener noreferrer" target="_blank">Google Titan</a>, have become a cornerstone of enterprise security, adding a much-needed layer of protection on top of the password. But researchers have now shown that it is possible to clone keys -- given the key, a few hours, and thousands of dollars.</p><p>Researchers from security firm NinjaLab have managed to <a href="https://www.zdnet.com/article/new-side-channel-attack-can-recover-encryption-keys-from-google-titan-security-keys/">make a clone of a Google Titan 2FA security key</a>. The process makes use of a side-channel vulnerability in the NXP A700X chip.</p><p><strong>Must read</strong>: <a href="https://www.zdnet.com/article/best-security-key/"><strong>Best security keys in 2021: Hardware-based two-factor authentication for online protection</strong></a></p><div class="shortcodeGalleryWrapper" data-component="lazyloadImages">

<div class="gallery-details">

<a class="gallery-title" data-component="imageGalleryModal" href="/pictures/yubikey-5c-nfc-the-worlds-first-security-key-to-feature-dual-usb-c-and-nfc-connections/"><span>YubiKey 5C NFC: The world’s first security...</span></a>

<a class="full-gallery" data-component="imageGalleryModal" data-omniture-track="moduleClick" data-omniture-track-data='{"moduleInfo": "see_full_gallery", "pageType": "article"}' href="/pictures/yubikey-5c-nfc-the-worlds-first-security-key-to-feature-dual-usb-c-and-nfc-connections/">SEE FULL GALLERY</a>

</div>

<div class="shortcode-gallery" data-component="shortcodeGallery" data-shortcode-gallery-options='{"count":9,"preloadThreshold":9}'>

<div data-item="window">

<div class="row viewport" data-item="viewport">

<div class="thumbnail selected" data-item="image" section="galleryItem.1">

<a class="image-link-wrapper" data-component="imageGalleryModal" href="/pictures/yubikey-5c-nfc-the-worlds-first-security-key-to-feature-dual-usb-c-and-nfc-connections/">

<figure class="img"><span class="img"><img alt="" class="lazy" data-original="https://zdnet1.cbsistatic.com/hub/i/r/2020/09/07/14a58b87-bca4-40e2-8f22-acf54feac1f4/thumbnail/170x128/cc812d4671da75186506792edd301c5f/img-6451.jpg" height="128" src="" width="170"/></span><noscript><span class="img"><img alt="" class="" height="128" src="https://zdnet1.cbsistatic.com/hub/i/r/2020/09/07/14a58b87-bca4-40e2-8f22-acf54feac1f4/thumbnail/170x128/cc812d4671da75186506792edd301c5f/img-6451.jpg" width="170"/></span></noscript></figure>

</a>

</div>

<div class="thumbnail" data-item="image" section="galleryItem.2">

<a class="image-link-wrapper" data-component="imageGalleryModal" href="/pictures/yubikey-5c-nfc-the-worlds-first-security-key-to-feature-dual-usb-c-and-nfc-connections/2/">

<figure class="img"><span class="img"><img alt="" class="lazy" data-original="https://zdnet2.cbsistatic.com/hub/i/r/2020/09/07/5c83f337-c2d2-41f4-895d-ce117a5562fd/thumbnail/170x128/e69aa39b1f33e19eab8bb779500a4f7f/img-6452.jpg" height="128" src="" width="170"/></span><noscript><span class="img"><img alt="" class="" height="128" src="https://zdnet2.cbsistatic.com/hub/i/r/2020/09/07/5c83f337-c2d2-41f4-895d-ce117a5562fd/thumbnail/170x128/e69aa39b1f33e19eab8bb779500a4f7f/img-6452.jpg" width="170"/></span></noscript></figure>

</a>

</div>

<div class="thumbnail" data-item="image" section="galleryItem.3">

<a class="image-link-wrapper" data-component="imageGalleryModal" href="/pictures/yubikey-5c-nfc-the-worlds-first-security-key-to-feature-dual-usb-c-and-nfc-connections/3/">

<figure class="img"><span class="img"><img alt="" class="lazy" data-original="https://zdnet1.cbsistatic.com/hub/i/r/2020/09/07/8f8bcba1-a8b1-4711-b246-04a3615322c8/thumbnail/170x128/3a21525600149fd7e80e7934c835b7b3/img-6453.jpg" height="128" src="" width="170"/></span><noscript><span class="img"><img alt="" class="" height="128" src="https://zdnet1.cbsistatic.com/hub/i/r/2020/09/07/8f8bcba1-a8b1-4711-b246-04a3615322c8/thumbnail/170x128/3a21525600149fd7e80e7934c835b7b3/img-6453.jpg" width="170"/></span></noscript></figure>

</a>

</div>

<div class="thumbnail" data-item="image" section="galleryItem.4">

<a class="image-link-wrapper" data-component="imageGalleryModal" href="/pictures/yubikey-5c-nfc-the-worlds-first-security-key-to-feature-dual-usb-c-and-nfc-connections/4/">

<figure class="img"><span class="img"><img alt="" class="lazy" data-original="https://zdnet1.cbsistatic.com/hub/i/r/2020/09/07/000a2dc5-bab0-4277-a53a-b2c7c9e6aa75/thumbnail/170x128/21d7a417ce80720395c16ed276890c7e/img-6454.jpg" height="128" src="" width="170"/></span><noscript><span class="img"><img alt="" class="" height="128" src="https://zdnet1.cbsistatic.com/hub/i/r/2020/09/07/000a2dc5-bab0-4277-a53a-b2c7c9e6aa75/thumbnail/170x128/21d7a417ce80720395c16ed276890c7e/img-6454.jpg" width="170"/></span></noscript></figure>

</a>

</div>

<div class="thumbnail" data-item="image" section="galleryItem.5">

<a class="image-link-wrapper" data-component="imageGalleryModal" href="/pictures/yubikey-5c-nfc-the-worlds-first-security-key-to-feature-dual-usb-c-and-nfc-connections/5/">

<figure class="img"><span class="img"><img alt="" class="lazy" data-original="https://zdnet2.cbsistatic.com/hub/i/r/2020/09/07/a063569b-180b-474e-9ebb-81dc35b0d111/thumbnail/170x128/93b3fd8f75b487c7853b4cf099842fab/img-6455.jpg" height="128" src="" width="170"/></span><noscript><span class="img"><img alt="" class="" height="128" src="https://zdnet2.cbsistatic.com/hub/i/r/2020/09/07/a063569b-180b-474e-9ebb-81dc35b0d111/thumbnail/170x128/93b3fd8f75b487c7853b4cf099842fab/img-6455.jpg" width="170"/></span></noscript></figure>

</a>

</div>

<div class="thumbnail" data-item="image" section="galleryItem.6">

<a class="image-link-wrapper" data-component="imageGalleryModal" href="/pictures/yubikey-5c-nfc-the-worlds-first-security-key-to-feature-dual-usb-c-and-nfc-connections/6/">

<span class="img"><img alt="" class="" data-src="https://zdnet4.cbsistatic.com/hub/i/r/2020/09/07/9ae43495-68e5-4171-b4ec-3d5f1bd51bcd/thumbnail/170x128/4d9ba57511727f6f788f19b02164eb93/img-6456.jpg" src="data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACH5BAEAAAAALAAAAAABAAEAAAICRAEAOw=="/></span>

</a>

</div>

<div class="thumbnail" data-item="image" section="galleryItem.7">

<a class="image-link-wrapper" data-component="imageGalleryModal" href="/pictures/yubikey-5c-nfc-the-worlds-first-security-key-to-feature-dual-usb-c-and-nfc-connections/7/">

<span class="img"><img alt="" class="" data-src="https://zdnet2.cbsistatic.com/hub/i/r/2020/09/07/86f72c5c-ebdf-4cb5-907b-03a6ba7ceb0f/thumbnail/170x128/e8b03e65acb9f0dd7b2e3ae570a0759c/img-6457.jpg" src="data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACH5BAEAAAAALAAAAAABAAEAAAICRAEAOw=="/></span>

</a>

</div>

<div class="thumbnail" data-item="image" section="galleryItem.8">

<a class="image-link-wrapper" data-component="imageGalleryModal" href="/pictures/yubikey-5c-nfc-the-worlds-first-security-key-to-feature-dual-usb-c-and-nfc-connections/8/">

<span class="img"><img alt="" class="" data-src="https://zdnet4.cbsistatic.com/hub/i/r/2020/09/07/e91c8ca5-6f0f-4caa-adc4-5034c8cd3388/thumbnail/170x128/4d41000ab00b7d3edf6d29c972a922f6/img-6458.jpg" src="data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACH5BAEAAAAALAAAAAABAAEAAAICRAEAOw=="/></span>

</a>

</div>

<div class="thumbnail" data-item="image" section="galleryItem.9">

<a class="image-link-wrapper" data-component="imageGalleryModal" href="/pictures/yubikey-5c-nfc-the-worlds-first-security-key-to-feature-dual-usb-c-and-nfc-connections/9/">

<span class="img"><img alt="" class="" data-src="https://zdnet1.cbsistatic.com/hub/i/r/2020/09/07/ef0015ec-941f-42ae-83b7-5f3528d985c3/thumbnail/170x128/4e7945dda89cab007a998e94c69feb2a/img-6459.jpg" src="data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACH5BAEAAAAALAAAAAABAAEAAAICRAEAOw=="/></span>

</a>

</div>

</div>

</div>

<div class="gallery-controls">

<div data-item="image-count"><span class="first">1</span> - <span class="last">5</span> of <span class="count">9</span></div>

<span class="auxnext" section="auxnext">

<a class="next" data-omniture-track="moduleClick" data-omniture-track-data='{"moduleInfo": "next-text", "pageType": "article"}' data-to-image="next">

                           NEXT    <svg class="caret">

<use xlink:href="#caret"></use>

</svg>

</a>

</span>

<span class="auxprev" data-omniture-track="moduleClick" data-omniture-track-data='{"moduleInfo": "prev-text", "pageType": "article"}' section="auxprev">

<a class="prev disabled" data-to-image="previous">

<svg class="caret">

<use xlink:href="#caret"></use>

</svg>

 PREV

                       </a>

</span>

</div>

</div>

</div>

<p>I'll let you read up on this, but basically, the process requires having physical access to the key, take hours, involves trashing the casing to get at the chip, thousands of dollars of equipment, custom software, and a lot of know-how.</p><p>Oh, and the attacker also needs the target's account password.</p><p>The idea is that after the cloning process, the original key is put back into a new shell and given back to the rightful owner.</p><p>This will, as you might expect, be worrying for organizations that rely on 2FA keys. That said, the amount of information, along with free time an attacker needs to accomplish this is high. I mean, needing both the key and the password are themselves high hurdles.</p>

<section class="sharethrough-top" data-component="medusaContentRecommendation" data-medusa-content-recommendation-options='{"promo":"promo_zd_recommendation_sharethrough_top_in_article_desktop","spot":"dfp-in-article"}'>

<div class="ad-sharethrough-top ad-slot" data-ad="sharethrough-top" data-ad-container="5ff8b1312f2e4">

</div>

</section>

<p>On top of that, getting at the key involves trashing the casing of the original. This means that the replacement needs to be convincing, and in my experience keys take on a distinctive battering after very little use.</p><div data-shortcode=""></div>

<div class="relatedContent alignRight">

<h3 class="heading">

<span class="int">ZDNet Recommends</span>

</h3>

<div class="thumb">

<a data-omniture-track="moduleClick" data-omniture-track-data='{"moduleInfo": "pinbox", "pageType": "article"}' href="https://www.zdnet.com/article/best-security-key/">

<span class="img"><img alt="The best security keys: Hardware-based two-factor authentication for online protection" class="" height="165" src="https://zdnet1.cbsistatic.com/hub/i/r/2020/03/18/7c2e2258-7566-4e66-9059-a1a8aedf00b4/resize/220x165/c68ceb8e2eaa8fa28657f177434dc254/2020-03-18-at-12-23-32-pm.jpg" width="220"/></span>

</a>

</div>

<p class="title">

<a data-omniture-track="moduleClick" data-omniture-track-data='{"moduleInfo": "pinbox", "pageType": "article"}' href="https://www.zdnet.com/article/best-security-key/">

                       The best security keys: Hardware-based two-factor authentication for online protection

                   </a>

</p>

<p class="dek">While robust passwords go a long way to securing your valuable online accounts, hardware-based two-factor authentication takes that security to the next level.</p>

<p class="read-more">

<a data-omniture-track="moduleClick" data-omniture-track-data='{"moduleInfo": "pinbox", "pageType": "article"}' href="https://www.zdnet.com/article/best-security-key/">Read More</a>

</p>

</div>

<p>So, what can you do to mitigate this attack?</p><ul><li>Have strong passwords.</li><li>Treat your 2FA keys the same way you'd treat your car or house keys -- keep them with you at all times. </li><li>Make your keys distinctive -- I know someone who puts a spot of glittery nail polish on their key, leaves it to dry, and takes a photo of the unique glittery blob.</li><li>If you believe that your key has been compromised, inform your IT department (or, if that's you, remove the offending key from your accounts).</li><li>Google can detect cloned keys using its FIDO U2F counters feature.</li></ul><p>I expect that this will result in better, more tamper-resistant keys in the future. I use 2FA keys, and I am surprised how little tamper-resistance Google's Titan Bluetooth key has -- the shell snaps off easily to expose the innards.</p><div class="shortcodeGalleryWrapper" data-component="lazyloadImages">

<div class="gallery-details">

<a class="gallery-title" data-component="imageGalleryModal" href="/pictures/inside-a-google-titan-bluetooth-security-key/"><span>Inside a Google Titan Bluetooth security...</span></a>

<a class="full-gallery" data-component="imageGalleryModal" data-omniture-track="moduleClick" data-omniture-track-data='{"moduleInfo": "see_full_gallery", "pageType": "article"}' href="/pictures/inside-a-google-titan-bluetooth-security-key/">SEE FULL GALLERY</a>

</div>

<div class="shortcode-gallery" data-component="shortcodeGallery" data-shortcode-gallery-options='{"count":9,"preloadThreshold":9}'>

<div data-item="window">

<div class="row viewport" data-item="viewport">

<div class="thumbnail selected" data-item="image" section="galleryItem.1">

<a class="image-link-wrapper" data-component="imageGalleryModal" href="/pictures/inside-a-google-titan-bluetooth-security-key/">

<figure class="img"><span class="img"><img alt="" class="lazy" data-original="https://zdnet1.cbsistatic.com/hub/i/r/2019/06/12/bde7f605-25b6-48cc-8bce-36c40888cdf9/thumbnail/170x128/83f9a22e63b6a932bf9502f1f626f68d/001.jpg" height="128" src="" width="170"/></span><noscript><span class="img"><img alt="" class="" height="128" src="https://zdnet1.cbsistatic.com/hub/i/r/2019/06/12/bde7f605-25b6-48cc-8bce-36c40888cdf9/thumbnail/170x128/83f9a22e63b6a932bf9502f1f626f68d/001.jpg" width="170"/></span></noscript></figure>

</a>

</div>

<div class="thumbnail" data-item="image" section="galleryItem.2">

<a class="image-link-wrapper" data-component="imageGalleryModal" href="/pictures/inside-a-google-titan-bluetooth-security-key/2/">

<figure class="img"><span class="img"><img alt="" class="lazy" data-original="https://zdnet3.cbsistatic.com/hub/i/r/2019/06/12/224967b6-abbf-493a-a0d4-6b546f0f576f/thumbnail/170x128/accb2e3693a3d3c84e455482dba8eae5/002.jpg" height="128" src="" width="170"/></span><noscript><span class="img"><img alt="" class="" height="128" src="https://zdnet3.cbsistatic.com/hub/i/r/2019/06/12/224967b6-abbf-493a-a0d4-6b546f0f576f/thumbnail/170x128/accb2e3693a3d3c84e455482dba8eae5/002.jpg" width="170"/></span></noscript></figure>

</a>

</div>

<div class="thumbnail" data-item="image" section="galleryItem.3">

<a class="image-link-wrapper" data-component="imageGalleryModal" href="/pictures/inside-a-google-titan-bluetooth-security-key/3/">

<figure class="img"><span class="img"><img alt="" class="lazy" data-original="https://zdnet1.cbsistatic.com/hub/i/r/2019/06/12/79b943f3-e304-48c9-98ed-344e2ade5633/thumbnail/170x128/e117485667052b74804217ce52196c3d/003.jpg" height="128" src="" width="170"/></span><noscript><span class="img"><img alt="" class="" height="128" src="https://zdnet1.cbsistatic.com/hub/i/r/2019/06/12/79b943f3-e304-48c9-98ed-344e2ade5633/thumbnail/170x128/e117485667052b74804217ce52196c3d/003.jpg" width="170"/></span></noscript></figure>

</a>

</div>

<div class="thumbnail" data-item="image" section="galleryItem.4">

<a class="image-link-wrapper" data-component="imageGalleryModal" href="/pictures/inside-a-google-titan-bluetooth-security-key/4/">

<figure class="img"><span class="img"><img alt="" class="lazy" data-original="https://zdnet3.cbsistatic.com/hub/i/r/2019/06/12/be3d7cc7-f5da-40db-b372-46a80cf3aa7f/thumbnail/170x128/37567edd5c044d8c27984f32514f7bf7/004.jpg" height="128" src="" width="170"/></span><noscript><span class="img"><img alt="" class="" height="128" src="https://zdnet3.cbsistatic.com/hub/i/r/2019/06/12/be3d7cc7-f5da-40db-b372-46a80cf3aa7f/thumbnail/170x128/37567edd5c044d8c27984f32514f7bf7/004.jpg" width="170"/></span></noscript></figure>

</a>

</div>

<div class="thumbnail" data-item="image" section="galleryItem.5">

<a class="image-link-wrapper" data-component="imageGalleryModal" href="/pictures/inside-a-google-titan-bluetooth-security-key/5/">

<figure class="img"><span class="img"><img alt="" class="lazy" data-original="https://zdnet1.cbsistatic.com/hub/i/r/2019/06/12/a380f26f-ebad-4970-bc17-bb9959611ffb/thumbnail/170x128/29e95744c31c4517332af5b5a268a2f3/005.jpg" height="128" src="" width="170"/></span><noscript><span class="img"><img alt="" class="" height="128" src="https://zdnet1.cbsistatic.com/hub/i/r/2019/06/12/a380f26f-ebad-4970-bc17-bb9959611ffb/thumbnail/170x128/29e95744c31c4517332af5b5a268a2f3/005.jpg" width="170"/></span></noscript></figure>

</a>

</div>

<div class="thumbnail" data-item="image" section="galleryItem.6">

<a class="image-link-wrapper" data-component="imageGalleryModal" href="/pictures/inside-a-google-titan-bluetooth-security-key/6/">

<span class="img"><img alt="" class="" data-src="https://zdnet4.cbsistatic.com/hub/i/r/2019/06/12/830e48b9-1f2c-4c51-95e4-a9f6285d8aee/thumbnail/170x128/a041b5246baf2db43ba89f277f546d65/006.jpg" src="data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACH5BAEAAAAALAAAAAABAAEAAAICRAEAOw=="/></span>

</a>

</div>

<div class="thumbnail" data-item="image" section="galleryItem.7">

<a class="image-link-wrapper" data-component="imageGalleryModal" href="/pictures/inside-a-google-titan-bluetooth-security-key/7/">

<span class="img"><img alt="" class="" data-src="https://zdnet4.cbsistatic.com/hub/i/r/2019/06/12/255ebeb6-c15a-42fd-9a8e-c25ce7a9d507/thumbnail/170x128/2e87459f671acfe22343369f47faad10/007.jpg" src="data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACH5BAEAAAAALAAAAAABAAEAAAICRAEAOw=="/></span>

</a>

</div>

<div class="thumbnail" data-item="image" section="galleryItem.8">

<a class="image-link-wrapper" data-component="imageGalleryModal" href="/pictures/inside-a-google-titan-bluetooth-security-key/8/">

<span class="img"><img alt="" class="" data-src="https://zdnet3.cbsistatic.com/hub/i/r/2019/06/12/c6457d89-04bd-43e7-ba14-bcbe022c2754/thumbnail/170x128/c80ef210c72fd212611beee20ec460e5/008.jpg" src="data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACH5BAEAAAAALAAAAAABAAEAAAICRAEAOw=="/></span>

</a>

</div>

<div class="thumbnail" data-item="image" section="galleryItem.9">

<a class="image-link-wrapper" data-component="imageGalleryModal" href="/pictures/inside-a-google-titan-bluetooth-security-key/9/">

<span class="img"><img alt="" class="" data-src="https://zdnet4.cbsistatic.com/hub/i/r/2019/06/12/8292240f-2598-4921-9fee-d5dacc1b8765/thumbnail/170x128/4dca1e57071a337dea3391fd1d550c17/009.jpg" src="data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACH5BAEAAAAALAAAAAABAAEAAAICRAEAOw=="/></span>

</a>

</div>

</div>

</div>

<div class="gallery-controls">

<div data-item="image-count"><span class="first">1</span> - <span class="last">5</span> of <span class="count">9</span></div>

<span class="auxnext" section="auxnext">

<a class="next" data-omniture-track="moduleClick" data-omniture-track-data='{"moduleInfo": "next-text", "pageType": "article"}' data-to-image="next">

                           NEXT    <svg class="caret">

<use xlink:href="#caret"></use>

</svg>

</a>

</span>

<span class="auxprev" data-omniture-track="moduleClick" data-omniture-track-data='{"moduleInfo": "prev-text", "pageType": "article"}' section="auxprev">

<a class="prev disabled" data-to-image="previous">

<svg class="caret">

<use xlink:href="#caret"></use>

</svg>

 PREV

                       </a>

</span>

</div>

</div>

</div>

<p>Still, the ingenuity of this attack should be applauded. It's a very impressive hack.</p><div data-shortcode=""></div>

<div class="relatedContent alignNone">

<h3 class="heading">

<span class="int">Security</span>

</h3>

<ul>

<li>

<a data-omniture-track="moduleClick" data-omniture-track-data='{"moduleInfo": "pinbox", "pageType": "article"}' href="https://www.zdnet.com/article/online-security-101-how-to-protect-your-privacy-from-hackers-spies-and-the-government/">Cyber security 101: Protect your privacy from hackers, spies, and the government</a>

</li>

<li>

<a data-omniture-track="moduleClick" data-omniture-track-data='{"moduleInfo": "pinbox", "pageType": "article"}' href="https://www.zdnet.com/article/the-biggest-hacks-data-breaches-of-2020/">The biggest hacks, data breaches of 2020</a>

</li>

<li>

<a data-omniture-track="moduleClick" data-omniture-track-data='{"moduleInfo": "pinbox", "pageType": "article"}' href="https://www.zdnet.com/article/best-vpn-services-for-2021-safe-and-fast-dont-come-for-free/">The best VPNs for business and home use</a>

</li>

<li>

<a data-omniture-track="moduleClick" data-omniture-track-data='{"moduleInfo": "pinbox", "pageType": "article"}' href="https://www.zdnet.com/article/best-security-key/">The best security keys for two-factor authentication</a>

</li>

<li>

<a data-omniture-track="moduleClick" data-omniture-track-data='{"moduleInfo": "pinbox", "pageType": "article"}' href="https://www.zdnet.com/article/best-security-camera/">The best security cameras for business and home use</a>

</li>

<li>

<a data-component="externalLink" data-omniture-track="moduleClick" data-omniture-track-data='{"moduleInfo": "pinbox", "pageType": "article"}' href="https://www.youtube.com/watch?v=a4DApIHacPI" rel="noopener noreferrer" target="_blank">How hackers are trying to use QR codes as an entry point for cyber attacks (ZDNet YouTube)</a>

</li>

<li>

<a data-component="externalLink" data-omniture-track="moduleClick" data-omniture-track-data='{"moduleInfo": "pinbox", "pageType": "article"}' href="https://www.techrepublic.com/article/how-to-improve-the-security-of-your-public-cloud/?ftag=CMG-01-10aaa1b" rel="noopener noreferrer" target="_blank">How to improve the security of your public cloud (TechRepublic)</a>

</li>

</ul>

</div>

</div>


Report Page