XFER Blog

XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

ALERT: Change Your Twitter Password, Says Twitter

Alert_Blog_400

Twitter is recommending that all 336 million users change their passwords as soon as possible due to the discovery of an internal security flaw. While the issue has been fixed and no data breach seems to have taken place, Twitter is clearly taking this situation seriously.

On Thursday, May 3, it came to light that there was an internal log upon which an undisclosed number of account passwords were recorded without any protection. As a result, this unknown amount of passwords can no longer be considered secure, even though there is no apparent evidence that any data breach has occurred.

Twitter uses a process called hashing to protect their passwords, as many companies do. However, a bug created a log of passwords before they were hashed, leaving them fully legible. This bug has since been resolved.

In response to this situation, Twitter is being proactive and recommending that all of its users change their passwords, just in case. To do so, log in to your account in your browser, access Settings and privacy, and from there, Password. It is also a good idea to enable two-factor authentication by accessing Settings and privacy, clicking into Account. Once there, click on the “Set up login verification” button and follow the instructions. You will find yourself on a Login verification screen, where you can activate the means to generate another authentication code.

While disaster seems to be averted this time, you should not hesitate to change your password as soon as possible, and makes sure that all of your online accounts have strong passwords in place. For more information about keeping your identity safe online, call the IT professionals at XFER at 734-927-6666 / 800-Get-XFER.

 

Monitoring and Automation Make for a More Secure S...
What Star Wars can Teach About Mentorship
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, January 17 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Privacy Microsoft Internet Cloud Best Practices Saving Money Backup Software Workplace Tips Business Computing Managed Service Provider Hosted Solutions Data Hackers Small Business Google Mobile Devices Hardware Productivity VoIP Mobile Office Malware Email Gadgets Quick Tips Network Security Network Efficiency Innovation IT Support Business Management IT Services Business Social Media Business Continuity Miscellaneous Smartphones Server Upgrade Virtualization Communication Disaster Recovery User Tips Windows Communications Data Backup Computer Managed IT Services Microsoft Office Users Smartphone Passwords Browser Data Recovery Mobile Device Management Android Holiday WiFi Save Money Marketing Outsourced IT Alert Tech Term Ransomware Cybercrime Internet of Things Mobile Computing BDR Vendor Management Router Windows 10 Operating System Cloud Computing Remote Monitoring Chrome Automation Bring Your Own Device Apple BYOD Information Technology Artificial Intelligence Avoiding Downtime Computers Telephone Systems Spam Current Events Big Data Remote Computing Best Practice History Going Green IT Solutions The Internet of Things Managed IT Services Cybersecurity VPN Firewall Phone System Hacking Wireless Technology Social Engineering Health IT Consultant Employer-Employee Relationship Trending Printer Application Facebook Collaboration Productivity Bandwidth Proactive IT Lithium-ion Battery Windows 10 Office Excel Mobility App Budget Money Business Managament Mouse Fax Server Phishing Content Filtering Business Intelligence Networking Office 365 Maintenance Applications Mobile Device IT Support Windows 8 Two-factor Authentication Unified Threat Management Recovery How To iPhone Tutorials Information Training Hard Drives Virus Data Security Private Cloud Website Antivirus Redundancy Law Enforcement Gmail Encryption Analytics Apps Settings PowerPoint Google Drive Access Control User Error Data Protection Sports Value Managed IT Blockchain Humor Outlook Customer Relationship Management Word Save Time Streaming Media Risk Management Wi-Fi Social Analysis Inbound Marketing Identity Theft Office Tips Managed Service Data Management Voice over Internet Protocol Compliance Saving Time Connectivity Administration Flexibility IT Management Entertainment Digital Payment Downtime Social Networking Servers Vulnerability Tech Support File Sharing Memory Computer Repair Retail Human Resources Scam Conferencing Software as a Service Network Congestion Hacker Administrator Search Tablet Twitter Document Management Machine Learning Comparison USB HaaS End of Support Education Telephony Robot Safety Google Docs Government Statistics Windows 7 YouTube Spam Blocking Meetings Webinar Botnet Programming Paperless Office Skype Touchscreen DDoS Help Desk Running Cable Credit Cards Augmented Reality Intranet Solid State Drive OneNote Wearable Technology Black Market Instant Messaging Virtual Assistant Wireless Physical Security Data Storage Fraud Environment Cleaning Password Video Surveillance CES Best Available IT Plan Keyboard Display Public Cloud SaaS Work/Life Balance Bluetooth Data Breach Biometrics Telephone System Content Management IT service People IBM Piracy Data storage Samsung Leadership Unsupported Software Workers Infrastructure Smart Tech Update eWaste Internet Exlporer Online Currency Computer Accessories Point of Sale Data loss Recycling PDF Insurance Alerts IT Security Knowledge Smart Office Unified Communications FENG Staff Print Server Storage Online Shopping Entrepreneur Patch Management Safe Mode nternet Reputation Crowdfunding Screen Mirroring Nanotechnology Remote Worker Tablets Remote Support 360 Emails HVAC Security Cameras Text Messaging Business Mangement Practices Work Station Data Warehousing Specifications Hiring/Firing Internet exploMicrosoft Search Engine Gaming Console Start Menu Theft Windows Media Player Virtual Desktop Electronic Medical Records Digital Signature Business Owner Law Firm IT Addiction Virtual Private Network Regulations Evernote Cost Management NarrowBand Company Culture Windows 10s Accountants Business Technology Customers Charger Cast Wiring HBO Upgrades Analyitcs Uninterrupted Power Supply Enterprise Content Management Travel Criminal Hiring/Firing LinkedIn Hosted Computing Proactive Millennials HIPAA Advertising Students Bing Mobile Cortana Customer Service Multi-Factor Security Strategy Consultant Distributed Denial of Service Files Cache Project Management Wireless Charging Chromecast Net Neutrality Computer Care Devices GDPR Frequently Asked Questions Hosted Solution Windows 8.1 Update Password Management Inventory Remote Monitoring and Maintenance Workforce Notifications Healthcare Shortcuts Professional Services Google Apps Cameras Lifestyle Licensing Colocation Debate Wireless Internet Warranty Webcam Flash Fiber-Optic Laptop Audit IoT Macro WIndows 7 SharePoint Thought Leadership E-Commerce Tip of the week Amazon Virtual Reality Shadow IT Netflix Co-managed IT NIST Root Cause Analysis Line of Business Telecommuting Hybrid Cloud Electronic Health Records eCommerce Tools Printer Server Shortcut PC Care User IaaS Computing Infrastructure Supercomputer Wire Microchip Sync Cables Worker Commute Touchpad Computer Fan Managing Stress Domains Relocation Content Filter Camera Scheduling Windows Server 2008 Amazon Web Services Bloatware Legal Cryptocurrency 3D Monitor Authentication MSP Software Tips Remote Work Science Vendor eBay Password Manager Audiobook Utility Computing Assessment Printers Rootkit Politics Battery Television Transportation Video Games Thank You Troubleshooting Webinar Employee/Employer Relationship Automobile Public Computer Benefits Scalability Congratulations IT solutions Employer Employee Relationship CrashOverride Smartwatch Smart Technology How to Loyalty Books Techology Experience Regulation Content Two Factor Authentication Emergency Worker Music

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *