Get Started Today!  (845) 208-0453

croom new

S I M Technology Blog

ALERT: Change Your Twitter Password, Says Twitter

ALERT: Change Your Twitter Password, Says Twitter

Twitter is recommending that all 336 million users change their passwords as soon as possible due to the discovery of an internal security flaw. While the issue has been fixed and no data breach seems to have taken place, Twitter is clearly taking this situation seriously.

On Thursday, May 3, it came to light that there was an internal log upon which an undisclosed number of account passwords were recorded without any protection. As a result, this unknown amount of passwords can no longer be considered secure, even though there is no apparent evidence that any data breach has occurred.

Twitter uses a process called hashing to protect their passwords, as many companies do. However, a bug created a log of passwords before they were hashed, leaving them fully legible. This bug has since been resolved.

In response to this situation, Twitter is being proactive and recommending that all of its users change their passwords, just in case. To do so, log in to your account in your browser, access Settings and privacy, and from there, Password. It is also a good idea to enable two-factor authentication by accessing Settings and privacy, clicking into Account. Once there, click on the “Set up login verification” button and follow the instructions. You will find yourself on a Login verification screen, where you can activate the means to generate another authentication code.

While disaster seems to be averted this time, you should not hesitate to change your password as soon as possible, and makes sure that all of your online accounts have strong passwords in place. For more information about keeping your identity safe online, call the IT professionals at S I M Technology at (845) 208-0453.


How to Go About a Technology Needs Assessment
The Force is Strong with the Internet of Things


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, September 26 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Privacy Cloud Email Malware Hosted Solutions Internet Tech Term Business Computing Data Hackers Software Computer Business IT Services Network Security Ransomware Microsoft Backup Android Mobile Devices IT Support Google Cloud Computing Windows Data Management Smartphone Data Recovery Artificial Intelligence Hardware Innovation Productivity Small Business User Tips Data Backup Internet of Things Browser Encryption Alert Gmail Managed IT Services Vulnerability Server Phishing App Business Continuity Outsourced IT Efficiency Passwords Windows 10 Tip of the week Infrastructure Smartphones Network Paperless Office Facebook Remote Monitoring Chrome Saving Money Business Management Workplace Tips Cybersecurity Website Productivity Communication IT Support Robot Money Applications Antivirus Data storage Managed IT Services VoIP Storage IT Management Social Media Save Money Office 365 Managed Service Provider Bandwidth Managed Service Government Risk Management Apple Employer-Employee Relationship BYOD Windows 10 Two-factor Authentication Disaster Recovery Big Data SaaS Bring Your Own Device Mobile Security LiFi Telephone Systems Wi-Fi Mobile Device How To Office Tips Content Filtering VPN Data loss Miscellaneous Firewall Tablet Data Security Business Technology WiFi Analytics Mouse Virtual Private Network Blockchain Unified Threat Management Network Management communications Upgrade Maintenance Monitors Outlook Server Management Word YouTube Google Drive Administration Information Settings Unified Communications Automation Collaboration Quick Tips BDR Healthcare Machine Learning End of Support Holiday Spam Virtual Reality Document Management Customer Service Patch Management HIPAA Hosted Solution Computing Scam Router Multi-Factor Security Downtime Assessment Legal Identity Theft CrashOverride Running Cable OneNote Point of Sale Training WannaCry Dark Web Writing Development Samsung Social Humor Avoiding Downtime Printer Connectivity Files Apps G Suite Cyber Monday Marketing Cooperation Computers Management Typing Networking Modem Managed Services Provider Tech Support Heating/Cooling Disaster Google Calendar Gadgets Internet Exlporer Best Practice Emergency Hotspot Compliance Microsoft Office Employee-Employer Relationship Current Events Read Only Budget Microsoft Excel IT Technicians Retail Cables Time Management Access Control The Internet of Things Information Technology Smart Technology Staff Display Company Culture Twitter Cryptocurrency Halloween Cookies E-Commerce Websites Servers Uninterrupted Power Supply Legislation Users Hard Drive Recovery Operating System Firefox Language Laptop Regulations Remote Workers Going Green IoT Digital Mirgation Office Wires Hacks SharePoint Managed IT Distributed Denial of Service Augmented Reality Managing Stress Remote Computing Bitcoin IT service Techology Scary Stories Nanotechnology Vendor Management Features Comparison Cache Chromebook Business Growth Digital Payment Lenovo Customer Relationship Management Computing Infrastructure Social Networking Printing Buisness Star Wars Help Desk Mail Merge Spyware Permissions Chatbots Social Engineering Password Dark Data Touchscreen Downloads Google Wallet Shortcut IBM Managed IT Service Wearable Technology Enterprise Content Management Windows 8 Unified Threat Management Sports Screen Reader Statistics Solid State Drive Specifications Alerts Recycling Hacker Google Docs Superfish IT solutions Motherboard Monitoring Cost Management Automobile Deep Learning Address Fraud Education Identity Safety Cabling Drones Computer Care Corporate Profile Break Fix Virtual Desktop Vulnerabilities File Sharing VoIP Google Maps User Error Smart Tech Electronic Health Records Bluetooth Hard Disk Drive Black Friday Licensing Network Congestion eWaste Alt Codes Wireless Consulting Politics Work/Life Balance Mobile Computing Travel Private Cloud Virtualization Unsupported Software Update Supercomputer Law Enforcement Error Staffing Cybercrime Notifications Motion Sickness Computer Repair Taxes Administrator Mobile Data Web Server IT Budget How To Gadget Health Printers GPS Crowdsourcing IT Consultant Botnet Cameras Electronic Medical Records Tracking Meetings Cleaning Processors Physical Security CCTV Emoji Upgrades Regulation Mobile Device Management Webcam Personal Information Relocation Cortana 3D Printing

Latest Blog Entry

Technology support can be one of the major pain points for businesses, and it’s not something that your organization wants to invest in without thinking about the details. Technology support as a service has a lot to offer when compared with the break/fix method. We’ll help ...

Latest News

S I M Technology launches new website!

S I M Technology is proud to announce the launch of our new website at The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

Read more ...