Get Started Today!  321-259-5500

croom new

ALERT: Change Your Twitter Password, Says Twitter

ALERT: Change Your Twitter Password, Says Twitter

Twitter is recommending that all 336 million users change their passwords as soon as possible due to the discovery of an internal security flaw. While the issue has been fixed and no data breach seems to have taken place, Twitter is clearly taking this situation seriously.

On Thursday, May 3, it came to light that there was an internal log upon which an undisclosed number of account passwords were recorded without any protection. As a result, this unknown amount of passwords can no longer be considered secure, even though there is no apparent evidence that any data breach has occurred.

Twitter uses a process called hashing to protect their passwords, as many companies do. However, a bug created a log of passwords before they were hashed, leaving them fully legible. This bug has since been resolved.

In response to this situation, Twitter is being proactive and recommending that all of its users change their passwords, just in case. To do so, log in to your account in your browser, access Settings and privacy, and from there, Password. It is also a good idea to enable two-factor authentication by accessing Settings and privacy, clicking into Account. Once there, click on the “Set up login verification” button and follow the instructions. You will find yourself on a Login verification screen, where you can activate the means to generate another authentication code.

While disaster seems to be averted this time, you should not hesitate to change your password as soon as possible, and makes sure that all of your online accounts have strong passwords in place. For more information about keeping your identity safe online, call the IT professionals at TotalCareIT™ at 321-259-5500.

 

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, September 23 2018
If you'd like to register, please fill in the username, password and name fields.

Newsletter Sign Up

  • Company Name
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      Qr Code

      Tag Cloud

      Security Tip of the Week Best Practices Technology Cloud Privacy Hackers Malware Business Business Computing Email Hosted Solutions Internet Productivity IT Services Computer Backup Mobile Devices Microsoft Software Network Security Data Managed Service Provider Ransomware Hardware Windows 10 Workplace Tips Smartphone Google User Tips Tech Term Android Innovation Disaster Recovery Business Continuity Efficiency IT Support Data Management Managed IT Services Small Business Server Network App Communication Social Media Smartphones Browser Cloud Computing Artificial Intelligence BYOD Facebook Productivity Encryption Data Recovery Gmail Windows IT Support Office 365 Internet of Things Business Management Big Data Paperless Office Passwords Employer-Employee Relationship Data Backup Office Phishing Apps Save Money WiFi Hosted Solution Firewall Wireless Technology VoIP Outsourced IT Alert Recovery Spam Vendor Management Robot Risk Management Two-factor Authentication Remote Monitoring Upgrade Government Miscellaneous Office Tips Mobile Device Management Avoiding Downtime Work/Life Balance Holiday Tip of the week IT solutions Wireless Website Hacker Content Filtering Wi-Fi Cybersecurity How To Microsoft Office Money Saving Money Password Vulnerability Word Chrome Virtualization Budget Infrastructure Cybercrime Antivirus Analytics Remote Computing Machine Learning Automation Customer Service Bandwidth Data storage Virtual Reality Apple VPN Unified Threat Management Hard Drives Going Green Managed Service Education SaaS Legal IT service Tech Support Twitter Document Management The Internet of Things Collaboration IT Management Social Settings Applications Managed IT Services Computing Windows 10 Storage Quick Tips Google Drive Virtual Private Network G Suite Virtual Desktop Point of Sale Maintenance Monitors Cost Management Downtime Customer Relationship Management Cortana communications Telephone Systems Taxes Compliance Samsung YouTube Business Intelligence Unified Communications Router Automobile Blockchain How To Regulations Lithium-ion battery Server Management Hacking Best Practice Solid State Drive Computers Information Business Owner LiFi End of Support Scam Search User Error Network Management Healthcare Outlook Competition Sports Politics Tablet Health Patch Management Heating/Cooling Bring Your Own Device Data loss User HIPAA Printing Mobile Device Administration eWaste Computer Care Upgrades Websites Running Cable BDR Safety Presentation Mouse Physical Security Data Security Identity Theft IBM File Sharing Chromebook Business Technology Mobile Security Augmented Reality Training Botnet Save Time Managed Services Provider Google Maps Managed IT Online Laptop Alt Codes Management Spyware Downloads IT Technicians Co-managed IT Break Fix Assessment Techology Cooperation Information Technology Employee-Employer Relationship Supercomputer Black Friday Screen Reader Read Only Travel Disaster Dark Data Emoji Lenovo Hotspot Application Fun Trending Cables Staffing VoIP Unsupported Software Analyitcs Motherboard E-Commerce Error Google Docs Mail Merge Microsoft Excel Halloween Typing Company Culture Law Enforcement iPhone Multi-Factor Security Mirgation IT Budget Servers Backups Personal Information Dark Web Identities Internet Exlporer Web Server Corporate Profile Unified Threat Management Staff Google Wallet Remote Workers Cyber Monday Smart Tech Printers Motion Sickness Uninterrupted Power Supply Troubleshooting Superfish Language CIO Current Events Wires GPS Time Management Mobile Data Relocation Marketing Features Address Law Scary Stories Cryptocurrency Managing Stress IT Consultant Gadget Gadgets Google Calendar Chatbots Digital Payment Computer Repair Shortcut Net Neutrality IP Address Mobile Computing Hard Drive Cameras WannaCry Writing Notifications Printer Wearable Technology Undo Drones Smart Technology Knowledge Connectivity Hard Disk Drive Black Market Computing Infrastructure Tracking Private Cloud Public Speaking Modem Administrator Entrepreneur Permissions 5G Bitcoin Enterprise Content Management Cleaning Firefox Users Legislation Identity Monitoring FCC Mobile Office Cache CCTV Retail Crowdsourcing Access Control Statistics Distributed Denial of Service Experience IoT Meetings Network Congestion Networking Alerts Refrigeration Touchscreen Cookies Electronic Health Records Cabling Humor Update Fraud Windows 8 Vulnerabilities Comparison Consulting Operating System Electronic Medical Records Title II Business Growth Recycling Digital Social Engineering SharePoint Bluetooth Managed IT Service Deep Learning Star Wars Webcam Display Processors Licensing OneNote Specifications Social Networking Hiring/Firing Nanotechnology Files Environment Buisness Hacks Development 3D Printing Help Desk CrashOverride USB Domains Flexibility Regulation Emergency

      Latest Blog Entry

      There is no denying there is a standing partnership between IT and Healthcare. With costs inflating at a nearly-uncontrollable rate the healthcare industry has started to lean on IT to try and make the delivery of care more efficient. Today, we’ll take a look at healthcare I...

      Account Login