Get Started Today!  321-259-5500

croom new

ALERT: Change Your Twitter Password, Says Twitter

ALERT: Change Your Twitter Password, Says Twitter

Twitter is recommending that all 336 million users change their passwords as soon as possible due to the discovery of an internal security flaw. While the issue has been fixed and no data breach seems to have taken place, Twitter is clearly taking this situation seriously.

On Thursday, May 3, it came to light that there was an internal log upon which an undisclosed number of account passwords were recorded without any protection. As a result, this unknown amount of passwords can no longer be considered secure, even though there is no apparent evidence that any data breach has occurred.

Twitter uses a process called hashing to protect their passwords, as many companies do. However, a bug created a log of passwords before they were hashed, leaving them fully legible. This bug has since been resolved.

In response to this situation, Twitter is being proactive and recommending that all of its users change their passwords, just in case. To do so, log in to your account in your browser, access Settings and privacy, and from there, Password. It is also a good idea to enable two-factor authentication by accessing Settings and privacy, clicking into Account. Once there, click on the “Set up login verification” button and follow the instructions. You will find yourself on a Login verification screen, where you can activate the means to generate another authentication code.

While disaster seems to be averted this time, you should not hesitate to change your password as soon as possible, and makes sure that all of your online accounts have strong passwords in place. For more information about keeping your identity safe online, call the IT professionals at TotalCareIT™ at 321-259-5500.




No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, June 19 2018
If you'd like to register, please fill in the username, password and name fields.

Newsletter Sign Up

  • Company Name
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      Qr Code

      Tag Cloud

      Security Tip of the Week Best Practices Technology Cloud Privacy Hackers Malware Business Computing Business Email Hosted Solutions Productivity Internet Backup IT Services Network Security Computer Mobile Devices Managed Service Provider Microsoft Software Windows 10 Ransomware Hardware Smartphone User Tips Google Android Workplace Tips Data Business Continuity Disaster Recovery Innovation Efficiency IT Support Data Management Small Business App Social Media Server Communication Tech Term Encryption Smartphones Browser Managed IT Services Windows Artificial Intelligence Internet of Things Office 365 Business Management BYOD Facebook Data Recovery Cloud Computing Big Data Gmail Network Paperless Office Apps Phishing Employer-Employee Relationship Office WiFi Hosted Solution Data Backup Miscellaneous Upgrade Office Tips Robot Outsourced IT Wireless Technology Mobile Device Management Spam Vendor Management Alert Save Money Remote Monitoring Productivity Passwords Firewall Recovery Government Risk Management Saving Money Chrome Holiday Budget How To Avoiding Downtime IT solutions Hacker Cybersecurity Microsoft Office Password Vulnerability Word Virtualization Infrastructure Wireless Money Tip of the week Content Filtering Wi-Fi Work/Life Balance Two-factor Authentication Legal IT service Unified Threat Management Remote Computing Tech Support IT Support IT Management Cybercrime Apple Managed IT Services Going Green VoIP Antivirus Twitter Website Analytics Bandwidth Computing Hard Drives Education VPN Social Applications Settings The Internet of Things Automation Document Management Virtual Reality Data storage Windows 10 SaaS Customer Service Best Practice Server Management eWaste Compliance Heating/Cooling Tablet Presentation Regulations Computer Care Augmented Reality BDR End of Support Business Technology Training Politics Health Maintenance Upgrades Router Lithium-ion battery Printing Websites Hacking Telephone Systems Solid State Drive Business Intelligence User Error Botnet Search Google Drive Scam HIPAA Computers Monitors Running Cable Network Management Machine Learning Patch Management Administration Data loss Samsung Safety Collaboration Mobile Security Data Security IBM Downtime Identity Theft communications Cortana File Sharing Cost Management Outlook Virtual Private Network Customer Relationship Management Virtual Desktop Mobile Device YouTube Unified Communications Taxes Physical Security Business Owner Mouse Automobile LiFi Storage Competition User Sports 5G IoT Save Time FCC Digital Payment Hard Disk Drive Experience Emoji Dark Data Alerts Access Control Firefox Comparison Cleaning Law Enforcement Personal Information Star Wars Backups Statistics Title II Deep Learning Meetings Licensing Environment SharePoint Social Networking Current Events Specifications Buisness Gadget Computer Repair Assessment Bluetooth Online Co-managed IT Webcam Black Market Cooperation Motherboard iPhone Quick Tips Black Friday Trending Fun Application Internet Exlporer Microsoft Excel Google Maps Troubleshooting Bring Your Own Device Identities Point of Sale Network Congestion Lenovo Staff VoIP Cyber Monday Gadgets CIO Staffing Electronic Medical Records Hard Drive Operating System Blockchain Business Growth Corporate Profile Mobile Computing Web Server Processors Display Superfish Wearable Technology 3D Printing Modem Time Management Smart Technology Users GPS IP Address Managed IT Cache Shortcut Permissions Alt Codes WannaCry Cameras Public Speaking Unsupported Software Cookies Information Technology Distributed Denial of Service Tracking Mobile Office Administrator Refrigeration Recycling Google Docs Fraud Networking Typing CCTV Mobile Data Nanotechnology Google Wallet Touchscreen Managed IT Service Relocation Cabling Hiring/Firing Management IT Technicians Cryptocurrency Digital Downloads Laptop Notifications Writing Screen Reader Analyitcs Drones Break Fix Private Cloud Company Culture Hotspot Techology Mirgation Bitcoin Spyware Multi-Factor Security Halloween G Suite Crowdsourcing Retail Smart Tech Dark Web Marketing Supercomputer Error Disaster Travel Update Managing Stress Humor Mail Merge Language Unified Threat Management Chatbots Windows 8 Google Calendar Scary Stories Social Engineering Law Connectivity Servers Net Neutrality IT Budget Uninterrupted Power Supply Knowledge Motion Sickness Chromebook Undo Enterprise Content Management Entrepreneur Address Computing Infrastructure Printer Identity Hacks How To Legislation IT Consultant USB Emergency Domains Help Desk Flexibility CrashOverride

      Latest Blog Entry

      Communication is one of the most important parts of running an organization, and this is especially true for smaller organizations that need to work closely in order to make progress. Today’s collaborative workplace is dependent on people understanding a unified message and ...

      Account Login