XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

ALERT: Change Your Twitter Password, Says Twitter


Twitter is recommending that all 336 million users change their passwords as soon as possible due to the discovery of an internal security flaw. While the issue has been fixed and no data breach seems to have taken place, Twitter is clearly taking this situation seriously.

On Thursday, May 3, it came to light that there was an internal log upon which an undisclosed number of account passwords were recorded without any protection. As a result, this unknown amount of passwords can no longer be considered secure, even though there is no apparent evidence that any data breach has occurred.

Twitter uses a process called hashing to protect their passwords, as many companies do. However, a bug created a log of passwords before they were hashed, leaving them fully legible. This bug has since been resolved.

In response to this situation, Twitter is being proactive and recommending that all of its users change their passwords, just in case. To do so, log in to your account in your browser, access Settings and privacy, and from there, Password. It is also a good idea to enable two-factor authentication by accessing Settings and privacy, clicking into Account. Once there, click on the “Set up login verification” button and follow the instructions. You will find yourself on a Login verification screen, where you can activate the means to generate another authentication code.

While disaster seems to be averted this time, you should not hesitate to change your password as soon as possible, and makes sure that all of your online accounts have strong passwords in place. For more information about keeping your identity safe online, call the IT professionals at XFER at 734-927-6666 / 800-Get-XFER.


Monitoring and Automation Make for a More Secure S...
What Star Wars can Teach About Mentorship


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, October 19 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Privacy Microsoft Internet Cloud Best Practices Saving Money Backup Software Workplace Tips Managed Service Provider Business Computing Hackers Small Business Data Hosted Solutions Hardware Mobile Devices Google Productivity Mobile Office VoIP Gadgets Email Malware Quick Tips Network Security IT Support Efficiency Network Innovation Social Media Business Management IT Services Smartphones Server Miscellaneous Business Continuity Upgrade Virtualization Business Communication Windows Disaster Recovery Computer Managed IT Services Communications Microsoft Office User Tips Users Data Backup Mobile Device Management Passwords Browser Android Save Money Marketing Smartphone Holiday Alert Data Recovery WiFi Ransomware Mobile Computing Vendor Management Outsourced IT Tech Term Cybercrime Operating System Windows 10 Remote Monitoring Internet of Things Apple BYOD BDR Cloud Computing Information Technology Avoiding Downtime Computers Bring Your Own Device The Internet of Things Automation Artificial Intelligence Router Going Green Firewall Telephone Systems VPN Current Events Big Data Remote Computing History Best Practice Chrome IT Solutions IT Consultant Social Engineering Cybersecurity Printer Facebook Employer-Employee Relationship Spam Health Application Phone System Collaboration Wireless Technology Trending Hacking Bandwidth App Money Office Proactive IT Budget Excel Lithium-ion Battery Managed IT Services Networking How To Unified Threat Management Business Managament Two-factor Authentication Mobility Windows 10 Fax Server Business Intelligence iPhone Maintenance Applications Windows 8 Recovery Mouse Content Filtering Website User Error Managed IT Data Security Apps Gmail Humor Sports Value Outlook PowerPoint Productivity Tutorials Virus Private Cloud Redundancy Law Enforcement Phishing Antivirus Office 365 Customer Relationship Management Training Hard Drives Analytics Data Protection Google Drive Word Office Tips Conferencing Administration Mobile Device Digital Payment Identity Theft Social Networking Compliance Flexibility Information Search Computer Repair Tablet Entertainment Analysis Twitter Document Management IT Management Settings Retail Streaming Media Risk Management Data Management Connectivity Encryption Network Congestion Saving Time IT Support Inbound Marketing Vulnerability Tech Support Downtime File Sharing Memory Save Time Scam Blockchain Best Available Touchscreen Access Control Work/Life Balance Data Breach Comparison Smart Tech Bluetooth Data storage Workers People Windows 7 Samsung eWaste Internet Exlporer Machine Learning PDF Video Surveillance HaaS End of Support Data loss Online Currency Safety Wi-Fi Point of Sale Government Credit Cards Recycling YouTube Instant Messaging Piracy Spam Blocking Managed Service Education IBM Environment Paperless Office Meetings Statistics Leadership Servers Human Resources Webinar Administrator DDoS Fraud Biometrics CES Computer Accessories IT Plan IT service Programming Solid State Drive Skype Virtual Assistant Hacker Black Market Running Cable OneNote Augmented Reality Intranet Content Management Wireless Physical Security Unsupported Software Wearable Technology Cleaning Password Social Infrastructure Telephone System Public Cloud Data Storage SaaS USB Update Robot Keyboard SharePoint Software Tips Remote Work Audit Line of Business Display Shadow IT Entrepreneur Password Manager Macro Electronic Health Records Netflix Debate Hybrid Cloud Telephony Tablets Unified Communications Co-managed IT Wire Virtual Desktop Staff Cryptocurrency IaaS Computing Infrastructure Hiring/Firing Online Shopping Root Cause Analysis Content Filter Camera Touchpad Windows Media Player Google Docs Relocation Computer Fan Authentication MSP Legal Botnet Cost Management Business Mangement Supercomputer Data Warehousing Specifications Insurance Upgrades Start Menu Analyitcs Theft Smart Office Monitor Voice over Internet Protocol Customer Service Digital Signature Safe Mode Regulations Evernote Storage HBO Consultant FENG Nanotechnology Remote Worker Webcam Travel Criminal Knowledge HVAC Millennials Patch Management Practices IT Security Mobile Cortana Reputation Cameras Multi-Factor Security Strategy 360 Emails Accountants Business Technology Print Server Internet exploMicrosoft Wireless Charging Screen Mirroring Addiction Virtual Private Network nternet Crowdfunding PC Care Licensing Frequently Asked Questions Electronic Medical Records Wiring Remote Support NarrowBand Enterprise Content Management Customers 3D WIndows 7 Workforce Help Desk Windows 10s Hosted Computing Proactive Uninterrupted Power Supply Scheduling Professional Services Virtual Reality Google Apps Business Owner Students Printer Server Lifestyle Shortcut Law Firm IT Advertising Flash Fiber-Optic Charger Cast Cache Project Management Company Culture eBay Password Management Distributed Denial of Service Files Alerts Tip of the week User Amazon Hiring/Firing Devices GDPR Chromecast Worker Commute Software as a Service HIPAA Managing Stress Telecommuting Domains Inventory Remote Monitoring and Maintenance Tools Bloatware Healthcare LinkedIn Hosted Solution IoT Notifications Sync Science Cables Computer Care Wireless Internet Warranty Net Neutrality Text Messaging NIST Colocation Work Station Windows Server 2008 Amazon Web Services Thought Leadership E-Commerce Windows 8.1 Update Laptop Gaming Console Smart Technology Techology Books Regulation Loyalty Experience Two Factor Authentication Content Emergency Music Worker Printers Audiobook Assessment Rootkit Battery Video Games Politics Transportation Television Thank You Troubleshooting Webinar Scalability Benefits Automobile Public Computer Congratulations IT solutions Employer Employee Relationship CrashOverride How to

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *
      • Company Name *
      • Number of Participants *
      • First Name *
      • Last Name *
      • Phone *
      • Yes, subscribe me to: