Legacy applications don’t support modern authentication — and cybercriminals know this. Read more