Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

3/6/2014
07:39 AM
Kristin Burnham
Kristin Burnham
Quick Hits
Connect Directly
LinkedIn
Twitter
RSS
E-Mail
50%
50%

Yahoo Unfriends Facebook, Google Sign-In

Yahoo drops third-party logins, will soon require Yahoo IDs

If you use your Google or Facebook credentials to sign into Yahoo services, you'll soon be out of luck: The company said it will end this process and require everyone to use a Yahoo ID instead.

"Yahoo is continually working on improving the user experience," a Yahoo spokesperson said in a statement. "This new process, which now asks users to sign in with a Yahoo username, will allow us to offer the best personalized experience to everyone."

Read the full article here.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kristin Burnham currently serves as InformationWeek.com's Senior Editor, covering social media, social business, IT leadership and IT careers. Prior to joining InformationWeek in July 2013, she served in a number of roles at CIO magazine and CIO.com, most recently as senior ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
rpbrennan
50%
50%
rpbrennan,
User Rank: Apprentice
3/7/2014 | 10:05:28 AM
re: Yahoo Unfriends Facebook, Google Sign-In
Faceplant auth: bad for security, bad for privacy. What's not to (un)like?
shjacks55
50%
50%
shjacks55,
User Rank: Apprentice
3/7/2014 | 4:34:00 AM
re: Yahoo Unfriends Facebook, Google Sign-In
Piss poor security to let Facebook be your log-in manager.
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Enterprise Cybersecurity Plans in a Post-Pandemic World
Download the Enterprise Cybersecurity Plans in a Post-Pandemic World report to understand how security leaders are maintaining pace with pandemic-related challenges, and where there is room for improvement.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-21602
PUBLISHED: 2021-09-16
libde265 v1.0.4 contains a heap buffer overflow in the put_weighted_bipred_16_fallback function, which can be exploited via a crafted a file.
CVE-2020-21603
PUBLISHED: 2021-09-16
libde265 v1.0.4 contains a heap buffer overflow in the put_qpel_0_0_fallback_16 function, which can be exploited via a crafted a file.
CVE-2020-21604
PUBLISHED: 2021-09-16
libde265 v1.0.4 contains a heap buffer overflow fault in the _mm_loadl_epi64 function, which can be exploited via a crafted a file.
CVE-2020-21605
PUBLISHED: 2021-09-16
libde265 v1.0.4 contains a segmentation fault in the apply_sao_internal function, which can be exploited via a crafted a file.
CVE-2020-21606
PUBLISHED: 2021-09-16
libde265 v1.0.4 contains a heap buffer overflow fault in the put_epel_16_fallback function, which can be exploited via a crafted a file.