Get Started Today!  (845) 208-0453

croom new

ALERT: Change Your Twitter Password, Says Twitter

ALERT: Change Your Twitter Password, Says Twitter

Twitter is recommending that all 336 million users change their passwords as soon as possible due to the discovery of an internal security flaw. While the issue has been fixed and no data breach seems to have taken place, Twitter is clearly taking this situation seriously.

On Thursday, May 3, it came to light that there was an internal log upon which an undisclosed number of account passwords were recorded without any protection. As a result, this unknown amount of passwords can no longer be considered secure, even though there is no apparent evidence that any data breach has occurred.

Twitter uses a process called hashing to protect their passwords, as many companies do. However, a bug created a log of passwords before they were hashed, leaving them fully legible. This bug has since been resolved.

In response to this situation, Twitter is being proactive and recommending that all of its users change their passwords, just in case. To do so, log in to your account in your browser, access Settings and privacy, and from there, Password. It is also a good idea to enable two-factor authentication by accessing Settings and privacy, clicking into Account. Once there, click on the “Set up login verification” button and follow the instructions. You will find yourself on a Login verification screen, where you can activate the means to generate another authentication code.

While disaster seems to be averted this time, you should not hesitate to change your password as soon as possible, and makes sure that all of your online accounts have strong passwords in place. For more information about keeping your identity safe online, call the IT professionals at S I M Technology at (845) 208-0453.


How to Go About a Technology Needs Assessment
The Force is Strong with the Internet of Things

Related Posts



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, 20 May 2018

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Cloud Technology Email Malware Privacy Business Computing Hackers Software Hosted Solutions Ransomware Internet Computer Backup Business Android Microsoft Network Security Mobile Devices Cloud Computing Windows IT Services Data Recovery Smartphone Data Management Alert Internet of Things Browser Data Hardware Small Business Google Tech Term Vulnerability Encryption User Tips Server Phishing Artificial Intelligence App Business Continuity Data Backup Windows 10 Gmail Smartphones Innovation Saving Money Tip of the week Cybersecurity Remote Monitoring Outsourced IT Productivity Infrastructure Managed IT Services Business Management IT Support Efficiency Productivity Passwords Communication IT Support Facebook Managed IT Services Windows 10 Robot Risk Management Office 365 Money Managed Service Provider Data storage IT Management Chrome Apple Social Media Disaster Recovery Bandwidth Antivirus Website Government Big Data Telephone Systems communications SaaS Storage Upgrade Office Tips Firewall Google Drive Two-factor Authentication WiFi Unified Threat Management Customer Service Maintenance Scam Administration LiFi VPN Content Filtering Data Security End of Support Holiday Virtual Private Network Analytics Mobile Device Server Management Network Mouse Paperless Office Outlook Data loss Tablet Spam Settings HIPAA Hosted Solution YouTube Mobile Security Word Monitors Computing Applications Save Money BDR Employer-Employee Relationship Automation BYOD Virtual Reality Business Technology Miscellaneous CrashOverride SharePoint Identity Theft Network Management Information Technology Running Cable Mirgation Nanotechnology Distributed Denial of Service Hard Drive Managed IT Operating System Hacks Marketing Computing Infrastructure Lenovo Business Growth How To Downloads Writing Touchscreen Chatbots Samsung Screen Reader Managed IT Service Cache Shortcut Unified Communications Password Alerts Superfish Hacker Dark Data Firefox Retail Google Wallet Laptop Identity Smart Tech Break Fix Patch Management Google Docs Licensing Recovery Alt Codes Customer Relationship Management Multi-Factor Security Office Digital Payment Drones Workplace Tips Dark Web Vendor Management Buisness Typing Cooperation IBM Networking Compliance Google Calendar Connectivity Social Engineering Heating/Cooling IT solutions Microsoft Excel Cabling Cryptocurrency Computer Care Virtual Desktop Current Events Staff Corporate Profile Regulations Legislation The Internet of Things Safety Wireless Servers Budget Automobile Downtime Blockchain WannaCry Techology Bitcoin Network Congestion Training Going Green Politics Augmented Reality Social Networking Comparison IoT Gadgets Permissions Wi-Fi Disaster Mail Merge Unified Threat Management Computers Quick Tips Printing Tech Support Wearable Technology Motherboard Specifications Star Wars Microsoft Office Statistics Halloween Windows 8 Users Fraud Uninterrupted Power Supply Address Deep Learning Digital User Error Display VoIP Websites Twitter Router Black Friday Cost Management IT service Bluetooth Scary Stories Bring Your Own Device Spyware Printer Avoiding Downtime Remote Computing Modem Cyber Monday Assessment Apps Legal Collaboration Sports Social Hotspot Solid State Drive Emergency Best Practice Humor Access Control Document Management Time Management Education IT Technicians Cookies Smart Technology Internet Exlporer Google Maps File Sharing Language Hard Disk Drive Relocation 3D Printing Travel G Suite Work/Life Balance Supercomputer Private Cloud Unsupported Software Motion Sickness Taxes Law Enforcement Update Notifications IT Budget Error Recycling Mobile Data IT Consultant Mobile Device Management Gadget Crowdsourcing VoIP eWaste Meetings Cleaning Mobile Computing Chromebook Physical Security Webcam Emoji Personal Information Point of Sale Cortana Staffing Cybercrime Virtualization Administrator Web Server Computer Repair GPS How To Cameras Health Tracking Botnet CCTV Electronic Medical Records Machine Learning Processors Upgrades

Latest Blog Entry

It can be argued that your organization isn’t considered “modern” without taking advantage of truly modern technology solutions. This includes the cloud, which provides anytime-anywhere access to important information or products. This type of access--also known as Product a...

Latest News

S I M Technology launches new website!

S I M Technology is proud to announce the launch of our new website at The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

Read more ...