shutterstock 6840 TEST SIZE V1 051116

 

 "Experienced Analysts are ready to help you."

Have IT Questions?
Call us now (888) 894-6411

TWINTEL Solutions Blog

ALERT: Change Your Twitter Password, Says Twitter

ALERT: Change Your Twitter Password, Says Twitter

Twitter is recommending that all 336 million users change their passwords as soon as possible due to the discovery of an internal security flaw. While the issue has been fixed and no data breach seems to have taken place, Twitter is clearly taking this situation seriously.

On Thursday, May 3, it came to light that there was an internal log upon which an undisclosed number of account passwords were recorded without any protection. As a result, this unknown amount of passwords can no longer be considered secure, even though there is no apparent evidence that any data breach has occurred.

Twitter uses a process called hashing to protect their passwords, as many companies do. However, a bug created a log of passwords before they were hashed, leaving them fully legible. This bug has since been resolved.

In response to this situation, Twitter is being proactive and recommending that all of its users change their passwords, just in case. To do so, log in to your account in your browser, access Settings and privacy, and from there, Password. It is also a good idea to enable two-factor authentication by accessing Settings and privacy, clicking into Account. Once there, click on the “Set up login verification” button and follow the instructions. You will find yourself on a Login verification screen, where you can activate the means to generate another authentication code.

While disaster seems to be averted this time, you should not hesitate to change your password as soon as possible, and makes sure that all of your online accounts have strong passwords in place. For more information about keeping your identity safe online, call the IT professionals at TWINTEL Solutions at (888) 894-6411.

 

Monitoring and Automation Make for a More Secure S...
What Star Wars can Teach About Mentorship
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, November 20 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code

Our 10 Benefits

Our 10 Benefits Whitepaper

This whitepaper will evaluate the differences between traditional technical support practices and modern managed IT practices and the pros and cons of both in regards to small and medium-sized businesses.

Download Now!   Need A Consultation?

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Privacy Hackers Business Computing Network Security Backup Malware Hosted Solutions Data Google VoIP Mobile Devices Microsoft Business bgc roundup Software Disaster Recovery nonprofit Email Alert Innovation Internet Managed IT Services Business Continuity communications Hardware Outsourced IT IT Services Smartphones Managed IT Services Data Backup User Tips Tech Term Browser Windows 10 Computer Ransomware Server Saving Money Cybercrime Data Recovery Cloud Computing Android Efficiency BDR Computers Workplace Tips Smartphone Business Management Small Business Internet of Things IT Support Network Passwords Miscellaneous Communication Quick Tips Save Money Productivity Productivity IT Support Windows Office Chrome Recovery Applications Artificial Intelligence Mobile Device Management Money Managed IT Social Engineering Cybersecurity Telephone Systems BYOD Social Media Phishing Work/Life Balance Windows 10 Virtualization Hacking Upgrade Law Enforcement Facebook Collaboration Gadgets Vulnerability Firewall Mobility Microsoft Office Information VPN Wi-Fi Data Protection Password Proactive IT Holiday Office 365 Private Cloud Remote Monitoring Two-factor Authentication Bring Your Own Device Bandwidth Router Office Tips Avoiding Downtime Automation Budget Flexibility How To Health Managed Service Provider Compliance App Spam Connectivity Data Breach Google Drive Remote Computing Information Technology History Data Security Black Market Sports Servers HaaS Identity Theft Scam Operating System Mobile Computing Value Business Intelligence Apps Redundancy Word Mobile Device Safety Keyboard Battery Content Filtering Entertainment SaaS PDF Hiring/Firing CES Government Unsupported Software Cleaning Computing Infrastructure Business Owner Solid State Drive Data Storage Website The Internet of Things Emergency Marketing Training Encryption Workers Managed Service Big Data Content Management Computer Care Document Management IT Management Voice over Internet Protocol Patch Management Software as a Service Comparison OneNote Physical Security Blockchain Legal Virtual Assistant Samsung HIPAA Save Time IT Plan Charger Settings Risk Management Update Telephone System End of Support Electronic Medical Records Automobile Data storage Credit Cards Infrastructure Paperless Office Wireless Technology WiFi YouTube Worker USB Employer-Employee Relationship Data Management Unified Threat Management Spam Blocking Windows 7 Fraud Robot Workforce Cache Mobile Rootkit Digital Signature Video Games FENG Warranty Troubleshooting Customers Telephony Fiber-Optic Cryptocurrency Inventory Windows 10s Scalability Wiring Experience Regulations Amazon Smart Technology Business Mangement Network Congestion HVAC Relocation Files Frequently Asked Questions Telecommuting Wireless Internet Education Professional Services Devices Printer Skype Cables Employer Employee Relationship webinar Safe Mode Software Tips Access Control Public Cloud Laptop Hacker Amazon Web Services Two Factor Authentication Gmail Techology Networking Chromecast Humor MSP Excel Remote Work Cortana IBM Wire Meetings Microchip Vendor Management Accountants Assessment Thought Leadership Shadow IT Mouse Books Start Menu Unified Communications Computer Accessories Conferencing Apple Authentication Instant Messaging Touchpad Internet Exlporer Online Shopping Recycling IT Consultant Enterprise Content Management Multi-Factor Security File Sharing Tip of the week Google Apps Supercomputer Smart Office NarrowBand Users Data loss Search Engine iPhone HBO Specifications Television Twitter CrashOverride Administrator Hosted Solution Tools Theft Bluetooth Human Resources Netflix Best Practice Content Nanotechnology Audit Search Camera Flash Evernote eWaste Leadership Password Management Trending Bing Practices Augmented Reality Going Green Politics User Error Windows Server 2008 Transportation Current Events Virtual Reality Screen Mirroring Downtime Outlook Millennials Public Computer Addiction Wireless Staff Regulation Audiobook Loyalty Smart Tech Computer Fan How to Printers Reputation Advertising Sync Wireless Charging Criminal NIST Data Warehousing Lifestyle Help Desk Hosted Computing Remote Worker Monitor Colocation Benefits Password Manager Knowledge Machine Learning Worker Commute Hard Drives Cast Google Docs Thank You Congratulations GDPR nonprofits E-Commerce