631-905-9617    Get SUPPORT

Suffolk Computer Consultants Blog

ALERT: Change Your Twitter Password, Says Twitter

ALERT: Change Your Twitter Password, Says Twitter

Twitter is recommending that all 336 million users change their passwords as soon as possible due to the discovery of an internal security flaw. While the issue has been fixed and no data breach seems to have taken place, Twitter is clearly taking this situation seriously.

On Thursday, May 3, it came to light that there was an internal log upon which an undisclosed number of account passwords were recorded without any protection. As a result, this unknown amount of passwords can no longer be considered secure, even though there is no apparent evidence that any data breach has occurred.

Twitter uses a process called hashing to protect their passwords, as many companies do. However, a bug created a log of passwords before they were hashed, leaving them fully legible. This bug has since been resolved.

In response to this situation, Twitter is being proactive and recommending that all of its users change their passwords, just in case. To do so, log in to your account in your browser, access Settings and privacy, and from there, Password. It is also a good idea to enable two-factor authentication by accessing Settings and privacy, clicking into Account. Once there, click on the “Set up login verification” button and follow the instructions. You will find yourself on a Login verification screen, where you can activate the means to generate another authentication code.

While disaster seems to be averted this time, you should not hesitate to change your password as soon as possible, and makes sure that all of your online accounts have strong passwords in place. For more information about keeping your identity safe online, call the IT professionals at Suffolk Computer Consultants at 631-905-9617.

 

Why You Need to Know the Difference Between “Value...
What to Do With Your Old Power Converters, Accordi...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, August 22 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Privacy Cloud Cybersecurity Managed IT Services Malware Communications Backup Tech Term Network Security Smartphones Hardware Microsoft Hackers Business Management Business Outsourced IT Ransomware Hosted Solutions Passwords Communication Software Alert Google Social Media Android Productivity VoIP Wi-Fi Email Small Business Save Money Smartphone Microsoft Office Data Recovery Business Intelligence Employer-Employee Relationship Applications Router Internet Computer Data Twitter Data Backup Government Windows 10 IT Services Browser Cloud Computing Data Management Innovation Data Breach Settings Patch Management Efficiency User Tips Miscellaneous Phishing Saving Money Vulnerability Virtualization BDR Collaboration Internet of Things Mobile Devices IT Support Excel Office Blockchain Password Network Automation Analytics Apps Bandwidth VoIP How To Gadgets Paperless Office Windows Networking Cost Management Wireless Charging IT Support Website Office 365 Physical Security Managed IT Service Business Continuity Managed IT Services Data Protection Gmail Remote Monitoring Law Enforcement Information Tech Terms Holiday Retail Dark Web WiFi Cybercrime Spam Wireless Scam Mobile Device Management VPN Workers Virtual Assistant Tip of the week Remote Computing Chrome Access Control Virus Battery Cortana Compliance Word Company Culture Computers App Politics Productivity Artificial Intelligence Hacking PowerPoint Millennials Staffing SSD Paste iPhone Hiring/Firing IT budget Proactive IT Content Filtering Managing Stress Telephone System Digital Internet Explorer Work/Life Balance Information Technology Big Data Machine Learning A.I. Travel Gadget Hard Drive disposal Voice over Internet Protocol Tablet IT Management Sports Reporting Users Inventory Managed IT Remote Monitoring and Management Office Tips Automobile Printer Server Dongle G Suite Botnet Edge Threat Knowledge Entertainment Biometrics Telecommute Movies Live Streaming Facebook Shortcut Processors Value Connectivity Medical IT Files Telephony Recovery Lead Generation Mobile Security Telephone Systems File Sharing Disaster Recovery Analysis User Tip Cleaning Printers Bring Your Own Device Remote Support Hard Drives Maintenance Laptop Printing Google Drive Comparison Access Data loss Unified Communications WhatsApp CrashOverride Spyware Amazon Network Attached Storage Streaming Media GDPR Voice over IP Operating System Remote Control User Security Server Managed Service Google Maps Two-factor Authentication Technology Tips Hybrid Cloud Hosted Solution Antivirus Paper Specifications BYOD Staff RAM HP Database Workplace Tips Education Smart Technology Server Management Downloads Storage eCommerce Phone System WannaCry Environment Spam Blocking Business Technology Telecommuting Tech Support Backup and Disaster Recovery Copy Apple Ink Multi-Factor Security Conferencing Spotify SaaS Websites Microsoft Teams News Safety Document Management Tactics Plug-In Trends Licensing Online Shopping Marketing HIPAA e-waste Cables Email Management Sales Regulation Video Games Budget Money Synergy Employer Employee Relationship IaaS Customer Relationship Management Worker Competition Television Fun Credit Cards IP Address Freedom of Information Emoji HaaS Customer Service Printer Upgrade Mobile Office Domains Yahoo Encryption Unified Threat Management Leadership Windows 10 Search Mobile Device Current Events Public Speaking Vendor Management Computer Care Autocorrect Presentation Avoiding Downtime Personal Information Net Neutrality Lithium-ion battery Augmented Reality Emergency Dark Data Scheduling Samsung Gaming Console Wireless Technology 5G IBM Managed Service Provider Instagram The Internet of Things Error DDoS Scalability Hacker

Newsletter Sign Up