Male Rep1

 

 "Affordable, Effective, and Fast"

Have IT Questions?
Call us now (888) 894-6411

TWINTEL Solutions Blog

ALERT: Change Your Twitter Password, Says Twitter

ALERT: Change Your Twitter Password, Says Twitter

Twitter is recommending that all 336 million users change their passwords as soon as possible due to the discovery of an internal security flaw. While the issue has been fixed and no data breach seems to have taken place, Twitter is clearly taking this situation seriously.

On Thursday, May 3, it came to light that there was an internal log upon which an undisclosed number of account passwords were recorded without any protection. As a result, this unknown amount of passwords can no longer be considered secure, even though there is no apparent evidence that any data breach has occurred.

Twitter uses a process called hashing to protect their passwords, as many companies do. However, a bug created a log of passwords before they were hashed, leaving them fully legible. This bug has since been resolved.

In response to this situation, Twitter is being proactive and recommending that all of its users change their passwords, just in case. To do so, log in to your account in your browser, access Settings and privacy, and from there, Password. It is also a good idea to enable two-factor authentication by accessing Settings and privacy, clicking into Account. Once there, click on the “Set up login verification” button and follow the instructions. You will find yourself on a Login verification screen, where you can activate the means to generate another authentication code.

While disaster seems to be averted this time, you should not hesitate to change your password as soon as possible, and makes sure that all of your online accounts have strong passwords in place. For more information about keeping your identity safe online, call the IT professionals at TWINTEL Solutions at (888) 894-6411.

 

Monitoring and Automation Make for a More Secure S...
What Star Wars can Teach About Mentorship
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, February 20 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code

Our 10 Benefits

Our 10 Benefits Whitepaper

This whitepaper will evaluate the differences between traditional technical support practices and modern managed IT practices and the pros and cons of both in regards to small and medium-sized businesses.

Download Now!   Need A Consultation?

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Privacy Business Computing Network Security Hackers Hosted Solutions Backup Malware Mobile Devices Google Data VoIP Microsoft Disaster Recovery Business Internet nonprofit Software Email Business Continuity bgc communications roundup Managed IT Services IT Services Outsourced IT Alert User Tips Innovation Hardware Smartphones Data Backup Productivity Tech Term Windows 10 Browser Managed IT Services Saving Money Efficiency Cloud Computing Computer Ransomware Data Recovery Server Smartphone Internet of Things Cybercrime Android Workplace Tips IT Support Network IT Support BDR Computers Communication Small Business Business Management Windows Passwords Office Miscellaneous Cybersecurity Save Money Productivity Artificial Intelligence Quick Tips Managed IT Router Telephone Systems Money Windows 10 BYOD Mobile Device Social Engineering Mobility Recovery Holiday Gadgets Applications Mobile Device Management Chrome Phishing Automation Firewall Health Wi-Fi Work/Life Balance Vulnerability Proactive IT Social Media Virtualization Office 365 Private Cloud Collaboration Upgrade Law Enforcement Hacking Facebook Office Tips Flexibility Budget Avoiding Downtime Managed Service Provider Word Two-factor Authentication App VPN Password Data Protection Microsoft Office Bandwidth Bring Your Own Device How To Remote Monitoring Google Drive Compliance Information Black Market Identity Theft Connectivity Operating System Data Breach Business Intelligence Encryption Managed Service Apps Safety Keyboard Redundancy Spam Scam Settings Remote Computing Value Voice over Internet Protocol Software as a Service Sports Information Technology HaaS Save Time Data Security Mobile Computing History Servers SaaS Update CES Hiring/Firing Physical Security Wireless Technology Automobile Cleaning YouTube Training Workers WiFi Content Management Credit Cards USB Data Management End of Support Access Control Computer Care Patch Management Data storage OneNote Battery Content Filtering Google Docs Blockchain Virtual Assistant Entertainment Windows 7 Fraud Samsung Telephony The Internet of Things Business Owner Unsupported Software Charger Emergency Data Storage Website Human Resources Telephone System Big Data Government Electronic Medical Records PDF Solid State Drive Infrastructure Paperless Office Document Management Computing Infrastructure Marketing IT Management Worker Employer-Employee Relationship Legal Machine Learning Comparison Hacker Unified Threat Management Spam Blocking HIPAA IT Plan Risk Management FENG Hosted Solution Search Engine Data loss Apple Cryptocurrency Best Practice Content Tip of the week Warranty Tools Theft Business Mangement HVAC Smart Technology Network Congestion Digital Signage HBO Specifications Going Green Internet Exlporer Inventory Wiring Windows 10s Search Wireless Internet Virtual Reality Display Trending Politics Flash Evernote Devices Printer Bing Screen Mirroring iPhone Safe Mode Employer Employee Relationship webinar Audiobook Windows Server 2008 Gmail Networking Two Factor Authentication Google Search Outlook Millennials Public Cloud How to Cortana Wire IBM Worker Commute Security Cameras Data Warehousing Lifestyle User Error Accountants MSP Vendor Management Sync Wireless Charging Thought Leadership Mouse Assessment Help Desk Cast Downtime Computer Accessories Conferencing Video Games Wireless Troubleshooting Mobile Recycling Enterprise Content Management IT Consultant Net Neutrality Workforce Reputation Advertising Authentication Fiber-Optic Hard Drives Google Apps Smart Office Supercomputer Botnet Monitor Colocation File Sharing Scalability Experience Twitter Administrator Television CrashOverride Education Shortcuts Robot Bluetooth Netflix Regulations Amazon Professional Services Chromecast eWaste Password Management Leadership ISP Frequently Asked Questions Telecommuting Laptop Customers Nanotechnology Camera Audit Skype Cables Relocation Transportation Current Events Techology Smartwatch Software Tips Practices Augmented Reality Addiction Public Computer Social Files Staff Regulation Amazon Web Services Loyalty Computer Fan Shadow IT Books Microchip Meetings Criminal NIST Excel Remote Work Touchpad Smart Tech Printers Start Menu Unified Communications NarrowBand Humor Password Manager Benefits Knowledge Employee Hosted Computing Remote Worker Instant Messaging Cache Users Vendor Multi-Factor Security Digital Signature Rootkit Online Shopping GDPR Thank You E-Commerce Congratulations nonprofits