XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

ALERT: Change Your Twitter Password, Says Twitter


Twitter is recommending that all 336 million users change their passwords as soon as possible due to the discovery of an internal security flaw. While the issue has been fixed and no data breach seems to have taken place, Twitter is clearly taking this situation seriously.

On Thursday, May 3, it came to light that there was an internal log upon which an undisclosed number of account passwords were recorded without any protection. As a result, this unknown amount of passwords can no longer be considered secure, even though there is no apparent evidence that any data breach has occurred.

Twitter uses a process called hashing to protect their passwords, as many companies do. However, a bug created a log of passwords before they were hashed, leaving them fully legible. This bug has since been resolved.

In response to this situation, Twitter is being proactive and recommending that all of its users change their passwords, just in case. To do so, log in to your account in your browser, access Settings and privacy, and from there, Password. It is also a good idea to enable two-factor authentication by accessing Settings and privacy, clicking into Account. Once there, click on the “Set up login verification” button and follow the instructions. You will find yourself on a Login verification screen, where you can activate the means to generate another authentication code.

While disaster seems to be averted this time, you should not hesitate to change your password as soon as possible, and makes sure that all of your online accounts have strong passwords in place. For more information about keeping your identity safe online, call the IT professionals at XFER at 734-927-6666 / 800-Get-XFER.




No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, June 18 2018
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Privacy Microsoft Internet Cloud Saving Money Best Practices Backup Software Managed Service Provider Workplace Tips Business Computing Small Business Hackers Google Mobile Office Hosted Solutions Data Productivity Hardware Mobile Devices VoIP Quick Tips Gadgets Email Malware IT Support Efficiency Network Social Media Business Management Business Continuity Virtualization Upgrade Business IT Services Smartphones Network Security Server Miscellaneous Innovation Windows Disaster Recovery Communication Managed IT Services Microsoft Office Users Communications Mobile Device Management Computer Android Passwords User Tips Browser Smartphone Marketing Holiday WiFi Alert Save Money Data Backup Vendor Management Remote Monitoring Windows 10 Mobile Computing Ransomware Operating System Cybercrime Bring Your Own Device Apple BYOD Information Technology Computers Avoiding Downtime IT Solutions Current Events The Internet of Things Cloud Computing Best Practice History Internet of Things Data Recovery Going Green Chrome Big Data VPN Telephone Systems Remote Computing Outsourced IT Automation Social Engineering Trending Health Phone System Wireless Technology Employer-Employee Relationship Router IT Consultant Spam Application Firewall Collaboration BDR Hacking Tech Term Cybersecurity Artificial Intelligence Lithium-ion Battery Office Excel Budget App Money Proactive IT Printer Facebook Bandwidth Managed IT Services iPhone Fax Server Maintenance Content Filtering How To Windows 8 Two-factor Authentication Mobility Recovery Business Intelligence Business Managament Website Virus Analytics Private Cloud Customer Relationship Management Redundancy Data Security Networking Law Enforcement Hard Drives Gmail Mouse Office 365 Value Apps Phishing Managed IT User Error PowerPoint Unified Threat Management Antivirus Humor Data Protection Outlook Tutorials Office Tips Data Management Downtime Identity Theft Memory Compliance Flexibility Inbound Marketing Conferencing Entertainment Retail Tech Support Search Administration Tablet Productivity Sports Twitter Mobile Device Document Management Digital Payment Google Drive Social Networking Streaming Media Risk Management Network Congestion Computer Repair Windows 10 Saving Time Save Time Vulnerability Connectivity Word Comparison Wearable Technology Computer Accessories Meetings Work/Life Balance Data Breach Windows 7 Webinar Training DDoS Workers Best Available Social Solid State Drive Black Market Encryption Bluetooth Credit Cards People IT Management Settings Touchscreen Wireless Physical Security Samsung Environment Cleaning Data loss Smart Tech Human Resources Public Cloud Online Currency SaaS Spam Blocking Scam CES Biometrics IT Plan Recycling IT service Point of Sale Video Surveillance Data storage Hacker Content Management Statistics Unsupported Software eWaste Infrastructure Internet Exlporer Programming Piracy Skype IBM OneNote PDF Administrator Safety Wi-Fi USB Leadership HaaS End of Support Update Robot Intranet Government Running Cable YouTube Data Storage Hosted Computing 3D Keyboard Reputation Telephony Unified Communications LinkedIn Tablets Scheduling eBay Online Shopping Net Neutrality Hiring/Firing Cache Audit Internet exploMicrosoft Google Docs Staff Windows Media Player Virtual Desktop NarrowBand Windows 8.1 Update Devices Alerts Netflix Botnet Business Mangement File Sharing Cost Management Data Warehousing Specifications Display Inventory Customers Help Desk Start Menu Theft Upgrades Analyitcs Uninterrupted Power Supply Root Cause Analysis Customer Service IoT Text Messaging Supercomputer Applications Regulations Evernote Wireless Internet Computer Fan Advertising Voice over Internet Protocol Digital Signature Debate Chromecast HBO Consultant Thought Leadership Work Station Distributed Denial of Service Files Travel Criminal Instant Messaging Gaming Console Millennials Access Control Mobile Cortana Password Cameras Knowledge Servers Wireless Charging Wire Notifications FENG Multi-Factor Security Strategy Laptop Frequently Asked Questions Fraud Licensing Content Filter Patch Management Colocation Macro Workforce WIndows 7 Authentication 360 SharePoint Emails Professional Services Google Apps Virtual Reality Machine Learning Shadow IT Screen Mirroring IT Security Education Printer Server Shortcut Insurance Flash Fiber-Optic Smart Office Electronic Medical Records Hybrid Cloud Co-managed IT Lifestyle Business Owner Touchpad Tip of the week Amazon User Storage IaaS Windows 10s Computing Infrastructure Software as a Service Print Server Worker Commute Analysis Telecommuting Remote Support Managing Stress Domains Nanotechnology Relocation Tools nternet Crowdfunding Bloatware Webcam Charger Cast Legal Practices HIPAA IT Support Monitor Sync Cables Science Paperless Office Hiring/Firing Accountants Windows Server 2008 Amazon Web Services Company Culture Addiction Blockchain Law Firm IT Software Tips Remote Work Augmented Reality PC Care Hosted Solution Password Manager Entrepreneur Computer Care Students Employer Employee Relationship CrashOverride Battery Smart Technology Video Games Books Loyalty Experience Healthcare Content Thank You Two Factor Authentication Scalability Emergency Music Electronic Health Records Worker Audiobook Congratulations Assessment How to Rootkit Techology Politics Television Transportation Troubleshooting Webinar HVAC Automobile Public Computer Benefits IT solutions

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *