XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

ALERT: Change Your Twitter Password, Says Twitter

Alert_Blog_400

Twitter is recommending that all 336 million users change their passwords as soon as possible due to the discovery of an internal security flaw. While the issue has been fixed and no data breach seems to have taken place, Twitter is clearly taking this situation seriously.

On Thursday, May 3, it came to light that there was an internal log upon which an undisclosed number of account passwords were recorded without any protection. As a result, this unknown amount of passwords can no longer be considered secure, even though there is no apparent evidence that any data breach has occurred.

Twitter uses a process called hashing to protect their passwords, as many companies do. However, a bug created a log of passwords before they were hashed, leaving them fully legible. This bug has since been resolved.

In response to this situation, Twitter is being proactive and recommending that all of its users change their passwords, just in case. To do so, log in to your account in your browser, access Settings and privacy, and from there, Password. It is also a good idea to enable two-factor authentication by accessing Settings and privacy, clicking into Account. Once there, click on the “Set up login verification” button and follow the instructions. You will find yourself on a Login verification screen, where you can activate the means to generate another authentication code.

While disaster seems to be averted this time, you should not hesitate to change your password as soon as possible, and makes sure that all of your online accounts have strong passwords in place. For more information about keeping your identity safe online, call the IT professionals at XFER at 734-927-6666 / 800-Get-XFER.

 

Monitoring and Automation Make for a More Secure S...
What Star Wars can Teach About Mentorship
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, August 18 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Privacy Microsoft Internet Cloud Best Practices Saving Money Backup Software Managed Service Provider Workplace Tips Business Computing Small Business Hackers Google Productivity Hosted Solutions Data Mobile Office Hardware Mobile Devices VoIP Gadgets Quick Tips Email Malware IT Support Efficiency Network Social Media Business Management Innovation IT Services Network Security Smartphones Miscellaneous Business Continuity Server Virtualization Upgrade Business Windows Disaster Recovery Communication Managed IT Services Microsoft Office Communications Users Computer User Tips Mobile Device Management Passwords Data Backup Android Smartphone Marketing Browser Holiday Save Money Alert WiFi Vendor Management Data Recovery Mobile Computing Ransomware Cybercrime Outsourced IT Operating System Remote Monitoring Tech Term Windows 10 Bring Your Own Device Apple Computers BYOD BDR Information Technology Cloud Computing Avoiding Downtime Internet of Things Router Going Green Chrome Telephone Systems Automation Big Data Remote Computing VPN Current Events IT Solutions Best Practice History The Internet of Things IT Consultant Application Firewall Collaboration Facebook Hacking Spam Cybersecurity Social Engineering Health Employer-Employee Relationship Trending Phone System Wireless Technology Artificial Intelligence App Printer Managed IT Services Money Bandwidth Proactive IT Office Budget Lithium-ion Battery Excel Content Filtering Recovery Business Managament Business Intelligence Networking How To Fax Server Maintenance iPhone Windows 8 Two-factor Authentication Mobility Data Protection Managed IT Value User Error Apps Humor Data Security Outlook Private Cloud PowerPoint Unified Threat Management Website Tutorials Antivirus Redundancy Virus Law Enforcement Gmail Office 365 Applications Analytics Customer Relationship Management Hard Drives Mouse Phishing Google Drive IT Support Network Congestion Administration Blockchain Sports Search Tablet Vulnerability Mobile Device Twitter Word Digital Payment Document Management Social Networking Computer Repair Save Time Streaming Media Risk Management Identity Theft Analysis Office Tips Data Management Compliance Saving Time IT Management Flexibility Productivity Entertainment Connectivity Downtime File Sharing Memory Retail Windows 10 Inbound Marketing Tech Support Conferencing Scam People Unsupported Software IT service Infrastructure OneNote Touchscreen Data storage Hacker Samsung Update Access Control Internet Exlporer Data Storage Smart Tech Online Currency eWaste PDF Comparison Recycling Point of Sale Machine Learning Video Surveillance Robot Education Safety Work/Life Balance Wi-Fi Data Breach Windows 7 USB HaaS End of Support Statistics YouTube Information Government Meetings Workers Piracy Programming IBM Skype Webinar Leadership Credit Cards DDoS Paperless Office Administrator Running Cable Solid State Drive Data loss Augmented Reality Intranet Computer Accessories Wearable Technology Black Market Servers Encryption CES Instant Messaging Spam Blocking Cleaning Password Training IT Plan Settings Wireless Physical Security Environment Public Cloud Social Human Resources Best Available Content Management Biometrics Bluetooth SaaS Virtual Reality Shadow IT Charger Cast IoT Telephone System Work Station Telecommuting WIndows 7 SharePoint Wireless Internet Gaming Console Tools Hybrid Cloud Hiring/Firing NIST Printer Server Shortcut Macro HIPAA Thought Leadership Sync Cables Electronic Health Records Worker Commute Co-managed IT Touchpad Line of Business Windows Server 2008 Amazon Web Services User IaaS Computing Infrastructure Password Manager Bloatware Legal Computer Care Software Tips Remote Work Managing Stress Domains Relocation Hosted Solution Wire Cryptocurrency Monitor Keyboard Content Filter Telephony Unified Communications Science Google Docs Staff IT Security Authentication MSP Online Shopping Audit Botnet Business Mangement Entrepreneur Print Server Insurance Netflix Smart Office Crowdfunding Root Cause Analysis Safe Mode Data Warehousing Specifications Remote Support Reputation Storage Webcam Start Menu Theft Tablets nternet Computer Fan HVAC Voice over Internet Protocol Digital Signature Windows Media Player Virtual Desktop Supercomputer Nanotechnology Regulations Evernote Hiring/Firing Internet exploMicrosoft Travel Criminal Cost Management Law Firm IT NarrowBand Practices Managed Service HBO Company Culture Uninterrupted Power Supply Accountants Business Technology PC Care Millennials Customers Addiction Mobile Cortana Upgrades Analyitcs Advertising FENG Enterprise Content Management 3D Multi-Factor Security Strategy Customer Service Knowledge Scheduling Wireless Charging Help Desk LinkedIn eBay Chromecast Hosted Computing Proactive Frequently Asked Questions Fraud Consultant Net Neutrality Distributed Denial of Service Files Patch Management Students Screen Mirroring Virtual Assistant Alerts Workforce Windows 8.1 Update 360 Emails Cache Professional Services Google Apps Notifications Electronic Medical Records Password Management Lifestyle Cameras Display Devices Flash Fiber-Optic Text Messaging Software as a Service Debate Laptop Business Owner Inventory Remote Monitoring and Maintenance Tip of the week Amazon Licensing Colocation Windows 10s Healthcare Techology Troubleshooting Webinar Automobile Public Computer Benefits Regulation IT solutions Employer Employee Relationship CrashOverride Smart Technology Loyalty Books Experience Content Battery Remote Worker Two Factor Authentication Video Games Emergency Worker Music Audiobook Wiring Scalability Assessment Thank You Rootkit Politics How to Television Congratulations Transportation

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *