631-905-9617    Get SUPPORT

Suffolk Computer Consultants Blog

ALERT: Change Your Twitter Password, Says Twitter

ALERT: Change Your Twitter Password, Says Twitter

Twitter is recommending that all 336 million users change their passwords as soon as possible due to the discovery of an internal security flaw. While the issue has been fixed and no data breach seems to have taken place, Twitter is clearly taking this situation seriously.

On Thursday, May 3, it came to light that there was an internal log upon which an undisclosed number of account passwords were recorded without any protection. As a result, this unknown amount of passwords can no longer be considered secure, even though there is no apparent evidence that any data breach has occurred.

Twitter uses a process called hashing to protect their passwords, as many companies do. However, a bug created a log of passwords before they were hashed, leaving them fully legible. This bug has since been resolved.

In response to this situation, Twitter is being proactive and recommending that all of its users change their passwords, just in case. To do so, log in to your account in your browser, access Settings and privacy, and from there, Password. It is also a good idea to enable two-factor authentication by accessing Settings and privacy, clicking into Account. Once there, click on the “Set up login verification” button and follow the instructions. You will find yourself on a Login verification screen, where you can activate the means to generate another authentication code.

While disaster seems to be averted this time, you should not hesitate to change your password as soon as possible, and makes sure that all of your online accounts have strong passwords in place. For more information about keeping your identity safe online, call the IT professionals at Suffolk Computer Consultants at 631-905-9617.


Why You Need to Know the Difference Between “Value...
What to Do With Your Old Power Converters, Accordi...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, October 19 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Business Computing Technology Best Practices Cloud Privacy Cybersecurity Network Security Managed IT Services Malware Communications Tech Term Backup Productivity Smartphones Microsoft Hardware Passwords Communication Hackers Hosted Solutions User Tips Business Ransomware Internet VoIP Email Google Business Management Small Business Software Android Outsourced IT Browser Efficiency Save Money Social Media Wi-Fi Alert Twitter Miscellaneous Cloud Computing Saving Money Business Intelligence Applications Smartphone Collaboration Employer-Employee Relationship Computer Data Bandwidth Router Microsoft Office Data Backup Data Recovery Innovation Windows 10 Settings Patch Management Government Internet of Things Excel Vulnerability Office IT Services Mobile Devices Workplace Tips Data Management Network IT Support Automation Analytics Phishing BDR Access Control Virtualization VoIP Apps Mobile Device Blockchain Gadgets Data Breach Managed IT Services Password Users Information Wireless Charging Artificial Intelligence Retail Physical Security Managed IT Service App Data Protection Gmail Hacking Networking VPN Spam Workers Wireless Mobile Device Management Paperless Office Dark Web IT Support Cost Management Company Culture Remote Monitoring Tech Terms Politics Tip of the week Remote Computing Compliance Law Enforcement Chrome Holiday Virus WiFi Cybercrime Virtual Assistant Productivity Word Windows Marketing Scam Business Continuity How To Battery Computers Website Office 365 Cortana HIPAA e-waste Disaster Recovery Travel Microsoft Office 365 Recovery Trends Tablet SSD Maintenance Medical IT IT budget Cleaning PowerPoint Printers Spotify Analysis Digital Internet Explorer Access Outlook Managing Stress CrashOverride Knowledge Amazon Hard Drive disposal Live Streaming Authentication Hiring/Firing Machine Learning A.I. Antivirus Inventory Files Telephony GDPR IT Management Sports Telephone Systems File Sharing User Tip Managed Service Edge Threat BYOD Remote Support Work/Life Balance Dongle G Suite Google Drive Comparison Processors Education Value Smart Technology Two-factor Authentication WhatsApp Authorization Managed IT Telecommute Movies Phone System Automobile Lead Generation Mobile Security Voice over IP Storage Botnet Connectivity Remote Control User Security Office Tips Bring Your Own Device Laptop SaaS Printing Hosted Solution Specifications Plug-In Spyware Tech Support Data loss Unified Communications Cables Operating System eCommerce Error Hard Drives Network Attached Storage Streaming Media Staffing Safety Spam Blocking Business Technology Technology Tips Hybrid Cloud Telecommuting Paper Copy Apple Multi-Factor Security Conferencing Proactive IT HP Database Information Technology News Troubleshooting Server Staff RAM Gadget Voice over Internet Protocol Google Maps WannaCry Environment Licensing Online Shopping Touchscreen Server Management Downloads Email Management Sales Backup and Disaster Recovery Big Data Millennials Reporting Ink Printer Server Paste iPhone Content Filtering Remote Monitoring and Management Document Management Entertainment Tactics Biometrics Telephone System Update Websites Facebook Microsoft Teams Shortcut Samsung Unified Threat Management Customer Service Upgrade Managed Service Provider Mobile Office Domains DDoS Leadership Instagram Current Events Money Windows 10 Computer Care Employer Employee Relationship Public Speaking Fun Personal Information Net Neutrality Freedom of Information Presentation Gaming Console Lithium-ion battery Augmented Reality Yahoo Quick Tips Encryption Scalability Wireless Technology 5G Synergy IBM Emergency Video Games Worker The Internet of Things Regulation Search IaaS Hacker Television Budget Vendor Management Credit Cards Emoji Customer Relationship Management Autocorrect Competition Printer HaaS IP Address Avoiding Downtime Dark Data Scheduling

Newsletter Sign Up