253.777.0763    Get SUPPORT

ALERT: Change Your Twitter Password, Says Twitter

ALERT: Change Your Twitter Password, Says Twitter

Twitter is recommending that all 336 million users change their passwords as soon as possible due to the discovery of an internal security flaw. While the issue has been fixed and no data breach seems to have taken place, Twitter is clearly taking this situation seriously.

On Thursday, May 3, it came to light that there was an internal log upon which an undisclosed number of account passwords were recorded without any protection. As a result, this unknown amount of passwords can no longer be considered secure, even though there is no apparent evidence that any data breach has occurred.

Twitter uses a process called hashing to protect their passwords, as many companies do. However, a bug created a log of passwords before they were hashed, leaving them fully legible. This bug has since been resolved.

In response to this situation, Twitter is being proactive and recommending that all of its users change their passwords, just in case. To do so, log in to your account in your browser, access Settings and privacy, and from there, Password. It is also a good idea to enable two-factor authentication by accessing Settings and privacy, clicking into Account. Once there, click on the “Set up login verification” button and follow the instructions. You will find yourself on a Login verification screen, where you can activate the means to generate another authentication code.

While disaster seems to be averted this time, you should not hesitate to change your password as soon as possible, and makes sure that all of your online accounts have strong passwords in place. For more information about keeping your identity safe online, call the IT professionals at Graemouse Technologies at 253.777.0763.

 

Monitoring and Automation Make for a More Secure S...
What Star Wars can Teach About Mentorship
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, August 17 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Windows 10 FCC BDR Government Content Management Password Comparison Inventory Chrome Netflix VPN Humor Password Manager Marketing Current Events Avoiding Downtime Network Vulnerability Managed IT Services Data Storage Hybrid Cloud Spam Hardware Human Resources Outlook Miscellaneous Security Smart Tech Criminal Cybercrime Smartphones Safe Mode Email Communications Malware Windows 10 Root Cause Analysis Microsoft Data Recovery Blockchain Wi-Fi Internet Exlporer Managing Stress Google Leadership Smartphone Cloud Private Cloud Servers HaaS Business Intelligence Remote Monitoring Data Management Efficiency Tech Term Money Disaster Recovery Internet Information BYOD Google Drive Router Windows 7 IT Management Quick Tips Upgrade Practices Credit Cards Identity Theft Passwords IT Support Ransomware Document Management Windows Word Collaboration Mobile Devices Google Docs Bring Your Own Device Hosted Computing Android Digital Signature Flash Infrastructure Relocation Productivity Files Health IT Plan Encryption webinar Virtualization Electronic Medical Records Audit Managed IT Services Net Neutrality Website Innovation Bandwidth Business Continuity Downtime Browser VoIP Entertainment Employer-Employee Relationship FENG Addiction Cloud Computing Automation OneNote Spam Blocking Business Hackers Mobile Device Management Screen Mirroring App Cybersecurity The Internet of Things Data Breach CES Business Management Update Small Business Evernote Artificial Intelligence Data Security Managed Service Provider Cast Save Money Networking Phishing Workers Saving Money Skype Facebook Public Cloud Outsourced IT Data Protection NIST Law Enforcement Connectivity Software Redundancy Value Office 365 Budget How To Computer Fan Alert Software Tips Apps Apple Social Engineering Operating System Start Menu Network Security Smart Office Cache Managed IT Frequently Asked Questions IT Services HIPAA Technology Botnet Office Tip of the Week Gadgets Hiring/Firing Backup Computers Server Communication Productivity Samsung Travel Data eWaste Business Computing Unsupported Software Title II Specifications Hosted Solutions Social Media Data Backup End of Support Cryptocurrency Two-factor Authentication Online Shopping Microsoft Office Paperless Office User Tips Applications Telephone Systems Best Practices Computer Holiday Emergency Privacy Internet of Things Big Data

Newsletter Sign Up