croom new

S I M Technology Blog

ALERT: Change Your Twitter Password, Says Twitter

ALERT: Change Your Twitter Password, Says Twitter

Twitter is recommending that all 336 million users change their passwords as soon as possible due to the discovery of an internal security flaw. While the issue has been fixed and no data breach seems to have taken place, Twitter is clearly taking this situation seriously.

On Thursday, May 3, it came to light that there was an internal log upon which an undisclosed number of account passwords were recorded without any protection. As a result, this unknown amount of passwords can no longer be considered secure, even though there is no apparent evidence that any data breach has occurred.

Twitter uses a process called hashing to protect their passwords, as many companies do. However, a bug created a log of passwords before they were hashed, leaving them fully legible. This bug has since been resolved.

In response to this situation, Twitter is being proactive and recommending that all of its users change their passwords, just in case. To do so, log in to your account in your browser, access Settings and privacy, and from there, Password. It is also a good idea to enable two-factor authentication by accessing Settings and privacy, clicking into Account. Once there, click on the “Set up login verification” button and follow the instructions. You will find yourself on a Login verification screen, where you can activate the means to generate another authentication code.

While disaster seems to be averted this time, you should not hesitate to change your password as soon as possible, and makes sure that all of your online accounts have strong passwords in place. For more information about keeping your identity safe online, call the IT professionals at S I M Technology at (845) 208-0453.


How to Go About a Technology Needs Assessment
The Force is Strong with the Internet of Things


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, March 26 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Privacy Email Cloud Malware Productivity Data Hosted Solutions Internet Business Computing Hackers Business Tech Term Software Computer Network Security IT Services Cloud Computing Ransomware IT Support Google Mobile Devices Android Efficiency Microsoft Backup Hardware Data Backup Windows Data Recovery Encryption Small Business Server Phishing Browser Artificial Intelligence Innovation Business Management Data Management Windows 10 User Tips Outsourced IT Smartphone Vulnerability Upgrade Internet of Things Smartphones Business Continuity Managed IT Services Workplace Tips Alert Passwords Paperless Office Remote Monitoring App Saving Money Communication Cybersecurity Managed IT Services Windows 10 Gmail communications Antivirus Network Infrastructure VoIP Facebook IT Support Chrome Office 365 IT Management Government Social Media Bandwidth Holiday Quick Tips Website Productivity Collaboration Managed Service Employer-Employee Relationship Scam Tip of the week Microsoft Office VPN Mobile Device Business Technology Customer Service Applications Apple Blockchain Disaster Recovery Tablet Save Money Managed Service Provider Automation Robot Bring Your Own Device Maintenance Money Data storage Risk Management BYOD BDR Two-factor Authentication Information Big Data Wi-Fi Document Management Storage Healthcare Outlook Wireless Google Drive Office Tips Telephone Systems HIPAA Settings Router Unified Communications Access Control How To Office Spam Data Security Users Data loss Monitors WiFi Firewall Vendor Management Virtual Private Network Network Management Management Compliance Hosted Solution Computing YouTube Administration Unified Threat Management Server Management Machine Learning End of Support Social LiFi Word Virtual Reality Customer Relationship Management Apps Miscellaneous Politics Content Filtering SaaS Patch Management Operating System Downtime Mobile Security Analytics Mouse Hard Disk Drive Bitcoin Motherboard Dark Web Monitoring Avoiding Downtime Alerts Printer Recycling Permission Business Growth Identity Cyber Monday Wasting Time Marketing Identity Theft CrashOverride Retail Networking Printing Cost Management Authorization Bookmarks Point of Sale Gadgets Training WannaCry Display Twitter Emergency Password Smart Tech Hotspot Dark Data Electronic Health Records Heating/Cooling Websites Google Calendar Vulnerabilities Security Cameras G Suite Recovery Windows 8 Microsoft Excel Consulting Time Management Licensing Google Wallet eWaste Test Disaster Hacker Smart Technology Google Docs OneNote Database Assessment Employees Favorites Halloween Remote Computing Mobile Device Management Connectivity Language Files Laptop Servers Deep Learning Legislation Development ROI Chromebook Modem Managed Services Provider Cooperation SharePoint Drones RMM Uninterrupted Power Supply Electronic Medical Records Managed IT Alt Codes Distributed Denial of Service Employee-Employer Relationship Voice over Internet Protocol Firefox Social Engineering Techology Internet Exlporer Remote Monitoring and Management Scary Stories Legal Cables Notes Digital Lenovo The Internet of Things Computing Infrastructure Instant Messaging Read Only IT Technicians Comparison Mail Merge Cookies Permissions Humor E-Commerce IT service Touchscreen Staff Downloads Company Culture Tech Terms Buisness Shortcut Automobile Typing Regulations Managed IT Service Remote Workers Net Neutrality Digital Payment Safety Unified Threat Management Hard Drive Zero-Day Threat Sports Best Practice Mirgation Specifications Wires PowerPoint Spyware Superfish Current Events IoT Finance IT solutions Statistics IBM Network Congestion Address Nanotechnology Fraud Features Education Augmented Reality Budget Managing Stress Theft Solid State Drive Cryptocurrency Social Networking Break Fix Windows 7 Virtual Desktop VoIP User Error Information Technology Cache Human Error Bluetooth Private Cloud Chatbots Black Friday Professional Services Writing Samsung Going Green Star Wars Authentication Help Desk Cabling Computer Care Corporate Profile Computers Hacks Screen Reader Running Cable File Sharing Google Maps Tech Support Wearable Technology Multi-Factor Security Enterprise Content Management Financial Update Law Enforcement Computer Repair Error Regulation Notifications Travel Mobile Data Cybercrime How To Gadget Health Supercomputer Crowdsourcing Staffing Motion Sickness Botnet Taxes Administrator Web Server IT Budget GPS Processors Mobile Computing Physical Security IT Consultant Emoji Upgrades Cameras Relocation Tracking Printers Meetings Personal Information Cleaning Cortana 3D Printing CCTV Work/Life Balance Webcam Virtualization Unsupported Software

Latest Blog Entry

Your relationships with your customers and clients are reliant on one thing more than any other: communication. In order to optimize this communication, many businesses are leveraging technology solutions, and are enjoying a variety of operational benefits as a result. Is yo...

Latest News

S I M Technology launches new website!

S I M Technology is proud to announce the launch of our new website at The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

Read more ...