Female Rep1


 "99% Positive Customer Satisfaction Rate"

Have IT Questions?
Call us now (888) 894-6411


ALERT: Change Your Twitter Password, Says Twitter

ALERT: Change Your Twitter Password, Says Twitter

Twitter is recommending that all 336 million users change their passwords as soon as possible due to the discovery of an internal security flaw. While the issue has been fixed and no data breach seems to have taken place, Twitter is clearly taking this situation seriously.

On Thursday, May 3, it came to light that there was an internal log upon which an undisclosed number of account passwords were recorded without any protection. As a result, this unknown amount of passwords can no longer be considered secure, even though there is no apparent evidence that any data breach has occurred.

Twitter uses a process called hashing to protect their passwords, as many companies do. However, a bug created a log of passwords before they were hashed, leaving them fully legible. This bug has since been resolved.

In response to this situation, Twitter is being proactive and recommending that all of its users change their passwords, just in case. To do so, log in to your account in your browser, access Settings and privacy, and from there, Password. It is also a good idea to enable two-factor authentication by accessing Settings and privacy, clicking into Account. Once there, click on the “Set up login verification” button and follow the instructions. You will find yourself on a Login verification screen, where you can activate the means to generate another authentication code.

While disaster seems to be averted this time, you should not hesitate to change your password as soon as possible, and makes sure that all of your online accounts have strong passwords in place. For more information about keeping your identity safe online, call the IT professionals at TWINTEL Solutions at (888) 894-6411.


Monitoring and Automation Make for a More Secure S...
What Star Wars can Teach About Mentorship

Related Posts



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, September 21 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!


Our 10 Benefits

Our 10 Benefits Whitepaper

This whitepaper will evaluate the differences between traditional technical support practices and modern managed IT practices and the pros and cons of both in regards to small and medium-sized businesses.

Download Now!   Need A Consultation?

Tag Cloud

Security Tip of the Week Best Practices Cloud Privacy Technology Business Computing Hackers Network Security Backup Malware Hosted Solutions Mobile Devices Google VoIP Microsoft Data nonprofit Software bgc Disaster Recovery Email roundup Managed IT Services Alert Internet Business Outsourced IT Business Continuity Innovation Smartphones communications Windows 10 Hardware IT Services Tech Term Ransomware Saving Money Browser Managed IT Services Server Android Data Backup Cybercrime Efficiency Computers Internet of Things IT Support Computer Small Business Cloud Computing Data Recovery Save Money Business Management Office Productivity Network Windows User Tips BDR Smartphone Quick Tips Passwords Managed IT Recovery Cybersecurity Money IT Support Communication Social Engineering Mobile Device Management Miscellaneous Telephone Systems Applications BYOD Artificial Intelligence Firewall Mobility Gadgets Work/Life Balance Phishing Social Media Virtualization Workplace Tips Collaboration Upgrade Law Enforcement Hacking Facebook Vulnerability Productivity Router Budget Proactive IT Office Tips Flexibility Avoiding Downtime How To Private Cloud Bring Your Own Device Bandwidth Compliance App Health Chrome Wi-Fi Password Microsoft Office Automation Holiday Windows 10 Office 365 Managed Service Provider Two-factor Authentication Remote Monitoring VPN Data Protection Black Market Value Operating System Remote Computing Apps Mobile Device Data Security Redundancy Sports Identity Theft Connectivity Mobile Computing Data Breach Business Intelligence Word Google Drive Safety Information Technology HaaS History Data Storage Website Physical Security Automobile The Internet of Things Electronic Medical Records Infrastructure Paperless Office Worker IT Management USB Data Management End of Support Employer-Employee Relationship Unified Threat Management Spam Blocking Data storage Keyboard Comparison Battery Content Filtering Servers Information Entertainment IT Plan CES SaaS Update Hiring/Firing Cleaning Business Owner Training Workers Emergency Encryption Managed Service Big Data Credit Cards Content Management Government Wireless Technology PDF Solid State Drive Computer Care Document Management YouTube Computing Infrastructure Marketing Patch Management Windows 7 Blockchain Virtual Assistant OneNote Legal Spam Samsung Save Time HIPAA Charger Settings Scam Risk Management Unsupported Software Bluetooth Netflix Hosted Solution Regulations Amazon Human Resources Telephone System Apple Television CrashOverride Best Practice Content Twitter Frequently Asked Questions Telecommuting eWaste Password Management Audit Professional Services Nanotechnology Camera Internet Exlporer Leadership Search Virtual Reality Skype Cables Practices Augmented Reality Transportation Current Events Politics Software Tips Laptop Amazon Web Services Staff Regulation iPhone Public Computer Audiobook Chromecast Voice over Internet Protocol Addiction How to Excel Remote Work Criminal NIST Loyalty Computer Fan Meetings Software as a Service Smart Tech Password Manager Machine Learning Worker Commute Start Menu Unified Communications Hosted Computing Remote Worker User Error Benefits Knowledge Wireless Rootkit Touchpad Online Shopping Digital Signature Downtime Video Games Multi-Factor Security Cache Troubleshooting Tip of the week Cryptocurrency FENG Data loss NarrowBand Reputation Advertising Business Mangement HVAC Hard Drives Windows 10s Tools Theft Inventory Monitor Wiring Colocation Smart Technology Network Congestion Scalability Experience HBO Specifications Wireless Internet Education Flash Evernote Robot Trending Windows Server 2008 Going Green Safe Mode Screen Mirroring WiFi Devices Customers Employer Employee Relationship webinar Outlook Millennials Gmail Networking Relocation Public Cloud Techology Access Control Two Factor Authentication Cortana Wire Vendor Management Sync Wireless Charging Accountants MSP Files IBM Data Warehousing Lifestyle Shadow IT Books Fraud Assessment Cast Google Docs Thought Leadership Computer Accessories Conferencing Workforce Recycling Enterprise Content Management Humor Mobile Authentication Hacker IT Consultant Instant Messaging Google Apps Smart Office Users Telephony Fiber-Optic File Sharing Supercomputer Congratulations Printers GDPR nonprofits Thank You E-Commerce