(Source: TechRadar) By Mike Williams 7 hours ago Security software … to authenticate, and using third-party components gives more opportunity for malware to attack the software.