888.678.7282    Get SUPPORT

Strata Information Technology Blog

ALERT: Change Your Twitter Password, Says Twitter

ALERT: Change Your Twitter Password, Says Twitter

Twitter is recommending that all 336 million users change their passwords as soon as possible due to the discovery of an internal security flaw. While the issue has been fixed and no data breach seems to have taken place, Twitter is clearly taking this situation seriously.

On Thursday, May 3, it came to light that there was an internal log upon which an undisclosed number of account passwords were recorded without any protection. As a result, this unknown amount of passwords can no longer be considered secure, even though there is no apparent evidence that any data breach has occurred.

Twitter uses a process called hashing to protect their passwords, as many companies do. However, a bug created a log of passwords before they were hashed, leaving them fully legible. This bug has since been resolved.

In response to this situation, Twitter is being proactive and recommending that all of its users change their passwords, just in case. To do so, log in to your account in your browser, access Settings and privacy, and from there, Password. It is also a good idea to enable two-factor authentication by accessing Settings and privacy, clicking into Account. Once there, click on the “Set up login verification” button and follow the instructions. You will find yourself on a Login verification screen, where you can activate the means to generate another authentication code.

While disaster seems to be averted this time, you should not hesitate to change your password as soon as possible, and makes sure that all of your online accounts have strong passwords in place. For more information about keeping your identity safe online, call the IT professionals at Strata Information Technology at 888.678.7282.

 

Why You Need to Know the Difference Between “Value...
What to Do With Your Old Power Converters, Accordi...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, September 18 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Business Computing Technology Managed IT Services Privacy Best Practices Cloud Cybersecurity Malware Hackers Communications Backup Internet Tech Term Ransomware Smartphones Outsourced IT VoIP Network Security Passwords Productivity Software Alert Business Management Social Media IT Support Business Google Hardware Save Money Hosted Solutions Microsoft Data Phishing User Tips Android Network App Data Backup Bandwidth Twitter Windows 10 Email Communication Small Business Data Recovery Cloud Computing Smartphone Microsoft Office Browser IT Services Data Breach Vulnerability Settings Employer-Employee Relationship Miscellaneous Remote Monitoring Scam Excel Saving Money Company Culture Cybercrime Politics Access Control Government Mobile Device Management Efficiency Internet of Things Computer Business Continuity Compliance BDR Apps Law Enforcement Productivity Mobile Device Blockchain Patch Management Workers Innovation Collaboration Office 365 Education Personal Information Automation Managed IT Service Vendor Management Spam Dark Web Networking Managing Stress Chrome SaaS Virus Word Wi-Fi Windows Virtual Assistant How To Applications Facebook Entertainment Recovery Antivirus Maintenance Password Retail Holiday Users Office Website Computers Microsoft Office 365 Gmail Automobile Websites Microsoft Teams Net Neutrality CrashOverride Remote Support Hard Drive Paperless Office Tactics BYOD Artificial Intelligence Trends WhatsApp Wireless Charging Synergy e-waste Disaster Recovery Medical IT Knowledge IT budget PowerPoint Gaming Console Yahoo SSD Voice over Internet Protocol Proactive IT Remote Control Authentication Wireless Processors Digital Internet Explorer Analytics Comparison Hard Drives A.I. Scalability Phone System Lead Generation disposal GDPR IT Management Sports Video Games Google Maps Emergency Telephony DDoS Inventory Information Mobile Devices Remote Monitoring and Management Two-factor Authentication Authorization Dongle Worker Apple Edge Threat IaaS Multi-Factor Security Specifications Avoiding Downtime Movies Credit Cards News Dark Data Spyware Value Television Information Technology Storage Tech Terms Connectivity Staffing Licensing Voice over IP Amazon Smart Technology Email Management HaaS Printer Server Tech Support Cortana Bring Your Own Device Printer iPhone Data loss Gadget Safety Telephone System WannaCry Unified Threat Management HP Biometrics Error Cost Management Streaming Media Marketing Travel Workplace Tips Business Intelligence The Internet of Things Regulation Sales Managed Service Provider Cleaning Printers Gadgets Budget Physical Security Technology Tips Hybrid Cloud WiFi Managed IT Touchscreen Router Content Filtering Hiring/Firing Employer Employee Relationship Staff RAM Current Events Shortcut HIPAA Botnet VPN Document Management Database Leadership Access Downloads Live Streaming Reporting Tablet Computer Care Files Battery Data Management Backup and Disaster Recovery Cables Plug-In Telephone Systems Data Protection Encryption Customer Service Mobile Office Upgrade Google Drive IT Support Hosted Solution Domains File Sharing User Tip Virtualization Autocorrect Machine Learning Copy Public Speaking Spam Blocking User Security Search Scheduling Tip of the week Server G Suite Windows 10 Presentation Telecommute VoIP Lithium-ion battery Emoji Mobile Security Paste Augmented Reality Business Technology Instagram Quick Tips Remote Computing Samsung Wireless Technology 5G Money Laptop Printing Conferencing Unified Communications IBM Network Attached Storage Managed IT Services Hacker eCommerce Operating System Telecommuting Paper Competition Customer Relationship Management Server Management IP Address Online Shopping Environment Big Data Ink Millennials Fun

Newsletter Sign Up