Get Started Today!  (845) 208-0453

croom new

ALERT: Change Your Twitter Password, Says Twitter

ALERT: Change Your Twitter Password, Says Twitter

Twitter is recommending that all 336 million users change their passwords as soon as possible due to the discovery of an internal security flaw. While the issue has been fixed and no data breach seems to have taken place, Twitter is clearly taking this situation seriously.

On Thursday, May 3, it came to light that there was an internal log upon which an undisclosed number of account passwords were recorded without any protection. As a result, this unknown amount of passwords can no longer be considered secure, even though there is no apparent evidence that any data breach has occurred.

Twitter uses a process called hashing to protect their passwords, as many companies do. However, a bug created a log of passwords before they were hashed, leaving them fully legible. This bug has since been resolved.

In response to this situation, Twitter is being proactive and recommending that all of its users change their passwords, just in case. To do so, log in to your account in your browser, access Settings and privacy, and from there, Password. It is also a good idea to enable two-factor authentication by accessing Settings and privacy, clicking into Account. Once there, click on the “Set up login verification” button and follow the instructions. You will find yourself on a Login verification screen, where you can activate the means to generate another authentication code.

While disaster seems to be averted this time, you should not hesitate to change your password as soon as possible, and makes sure that all of your online accounts have strong passwords in place. For more information about keeping your identity safe online, call the IT professionals at S I M Technology at (845) 208-0453.


How to Go About a Technology Needs Assessment
The Force is Strong with the Internet of Things

Related Posts



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, July 22 2018

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Email Malware Privacy Internet Hosted Solutions Business Computing Software Hackers Computer Network Security Ransomware Microsoft Tech Term Business Data Android Mobile Devices Backup IT Services Google Data Management Windows Data Recovery Cloud Computing Smartphone Hardware Alert Productivity Encryption Data Backup Small Business Artificial Intelligence Internet of Things Browser Server Phishing App Managed IT Services Windows 10 User Tips Gmail Vulnerability Business Continuity Innovation Saving Money Productivity IT Support Chrome Cybersecurity Remote Monitoring Outsourced IT Efficiency Infrastructure Passwords Tip of the week Paperless Office Smartphones IT Support Facebook Business Management Government Employer-Employee Relationship Risk Management Communication BYOD Storage Applications Antivirus Managed IT Services Robot Money Social Media Data storage Office 365 Managed Service Provider Bandwidth Two-factor Authentication Windows 10 Website IT Management Big Data Apple Disaster Recovery Server Management Administration Automation BDR LiFi Virtual Reality Miscellaneous Document Management Content Filtering HIPAA Router SaaS Upgrade Mobile Security Telephone Systems Google Drive Analytics Network Firewall Customer Service Unified Threat Management Spam Business Technology Maintenance Network Management Hosted Solution Bring Your Own Device YouTube End of Support Holiday Patch Management Mouse Scam Wi-Fi Outlook Mobile Device Settings communications Data loss Office Tips VPN Tablet Data Security Unified Communications WiFi Blockchain Monitors Virtual Private Network Computing Word Save Money Social Networking Comparison Spyware Humor Alt Codes Social Cost Management Vulnerabilities Collaboration Workplace Tips Permissions Mail Merge Unified Threat Management Solid State Drive Quick Tips Buisness Wearable Technology Motherboard Specifications Statistics Typing Assessment Machine Learning Information Technology Development File Sharing IT solutions Fraud Address Google Maps User Error Hard Disk Drive Operating System VoIP Black Friday CrashOverride Bluetooth Identity Theft Cryptocurrency Hacks Internet Exlporer Virtual Desktop Cables Samsung Writing Printer Avoiding Downtime G Suite Downtime Modem Cyber Monday How To Dark Data Bitcoin Password Hard Drive Google Wallet Wires Hotspot Retail Emergency Gadgets Access Control Google Docs Time Management IT Technicians Cookies Recovery Smart Technology Firefox Cache Drones Halloween Language Office Users Vendor Management SharePoint Deep Learning Mirgation VoIP Nanotechnology Chromebook Distributed Denial of Service Customer Relationship Management Managed IT Digital Payment Recycling Scary Stories Computing Infrastructure Social Engineering Lenovo Downloads IBM Touchscreen Chatbots Screen Reader Managed IT Service Shortcut Current Events eWaste Cabling Budget Apps Sports Alerts Safety Superfish Corporate Profile Computer Care Best Practice Connectivity Identity Management Automobile Education Smart Tech Break Fix Network Congestion Wireless Going Green Licensing Multi-Factor Security WannaCry Training The Internet of Things Politics Company Culture Running Cable Dark Web Computers Printing Disaster Cooperation Microsoft Office Networking Compliance Marketing Google Calendar Heating/Cooling Business Growth Windows 8 IoT Tech Support Managing Stress Twitter Microsoft Excel Display Uninterrupted Power Supply Staff Regulations Legislation Digital Servers Hacker Star Wars Websites Enterprise Content Management Laptop Remote Computing IT service Techology Legal Augmented Reality Electronic Medical Records Tracking Botnet Processors Upgrades CCTV 3D Printing Relocation Travel Unsupported Software Work/Life Balance Update Supercomputer Private Cloud Motion Sickness Notifications Mobile Data Taxes Law Enforcement Cybercrime IT Budget Mobile Device Management Error Managed Service Crowdsourcing IT Consultant Gadget Mobile Computing Meetings Physical Security Cleaning Emoji Webcam Personal Information Cortana Point of Sale Virtualization Computer Repair Staffing Administrator Web Server How To Health GPS Cameras

Latest Blog Entry

ata backup has become an essential piece of the modern business’ computing infrastructure but the act of protecting data from being lost is centuries old. Before there was recorded civilization, there were humans writing on the cave walls and carving notches into bone to aid...

Latest News

S I M Technology launches new website!

S I M Technology is proud to announce the launch of our new website at The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

Read more ...