Get Started Today!  (845) 208-0453

croom new

S I M Technology Blog

ALERT: Change Your Twitter Password, Says Twitter

ALERT: Change Your Twitter Password, Says Twitter

Twitter is recommending that all 336 million users change their passwords as soon as possible due to the discovery of an internal security flaw. While the issue has been fixed and no data breach seems to have taken place, Twitter is clearly taking this situation seriously.

On Thursday, May 3, it came to light that there was an internal log upon which an undisclosed number of account passwords were recorded without any protection. As a result, this unknown amount of passwords can no longer be considered secure, even though there is no apparent evidence that any data breach has occurred.

Twitter uses a process called hashing to protect their passwords, as many companies do. However, a bug created a log of passwords before they were hashed, leaving them fully legible. This bug has since been resolved.

In response to this situation, Twitter is being proactive and recommending that all of its users change their passwords, just in case. To do so, log in to your account in your browser, access Settings and privacy, and from there, Password. It is also a good idea to enable two-factor authentication by accessing Settings and privacy, clicking into Account. Once there, click on the “Set up login verification” button and follow the instructions. You will find yourself on a Login verification screen, where you can activate the means to generate another authentication code.

While disaster seems to be averted this time, you should not hesitate to change your password as soon as possible, and makes sure that all of your online accounts have strong passwords in place. For more information about keeping your identity safe online, call the IT professionals at S I M Technology at (845) 208-0453.

 

How to Go About a Technology Needs Assessment
The Force is Strong with the Internet of Things
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, December 13 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Privacy Cloud Email Malware Internet Hosted Solutions Business Computing Business Data Tech Term Hackers Network Security Productivity Software Computer Ransomware Microsoft IT Services Android Mobile Devices Data Backup Backup Data Recovery Hardware IT Support Cloud Computing Google Data Management Smartphone Encryption Artificial Intelligence Windows Browser Innovation Outsourced IT Alert Efficiency User Tips Business Continuity Small Business Internet of Things Server Vulnerability Remote Monitoring Managed IT Services Passwords Windows 10 Gmail Managed IT Services Windows 10 Smartphones Phishing App Saving Money Workplace Tips Social Media Bandwidth Communication Productivity IT Management Website Infrastructure Upgrade Paperless Office Network IT Support Business Management Tip of the week Facebook Antivirus Cybersecurity Chrome Collaboration Government Employer-Employee Relationship BYOD Risk Management Blockchain Storage communications Information Wi-Fi Big Data Mobile Device Managed Service Healthcare Two-factor Authentication Apple Customer Service Disaster Recovery Maintenance VoIP Robot Save Money Office 365 Applications Money Data storage Managed Service Provider BDR VPN Machine Learning Automation Holiday Administration Document Management Miscellaneous Data Security End of Support YouTube Content Filtering Business Technology Virtual Reality Operating System Virtual Private Network Wireless Network Management Politics Analytics Mouse Outlook SaaS Telephone Systems Server Management Google Drive Settings How To Quick Tips Data loss Downtime Firewall Unified Communications Tablet Spam Patch Management Office Tips Scam HIPAA Unified Threat Management Router Mobile Security Hosted Solution Computing Office Bring Your Own Device Customer Relationship Management Monitors Word WiFi Users LiFi Solid State Drive Best Practice Microsoft Excel Internet Exlporer Scary Stories Current Events Remote Monitoring and Management Time Management Access Control Compliance Employee-Employer Relationship Smart Technology The Internet of Things Read Only Instant Messaging IT Technicians Cables Cabling Budget Cookies E-Commerce Computer Care Corporate Profile Cryptocurrency Language Automobile Staff Company Culture Buisness File Sharing Google Maps Information Technology Tech Terms Servers Legislation Safety Hard Disk Drive Hard Drive Sports Going Green Zero-Day Threat SharePoint Regulations Remote Workers Managed IT Distributed Denial of Service IoT IT solutions Identity Theft CrashOverride Hacks Finance Techology Network Congestion Mirgation Wires Point of Sale Nanotechnology Features Education Training WannaCry Bitcoin Lenovo Computing Infrastructure Augmented Reality Managing Stress Comparison Virtual Desktop G Suite Business Growth Mail Merge Permissions Cache Printing Human Error Touchscreen Downloads Writing Samsung Social Networking Shortcut Managed IT Service Tech Support Star Wars Help Desk Password Dark Data Authentication Unified Threat Management Computers Chatbots Disaster Microsoft Office Screen Reader Running Cable Windows 8 Superfish Wearable Technology Enterprise Content Management Google Wallet Statistics Specifications Motherboard Monitoring Hacker Google Docs Address Fraud Alerts Recycling Permission Retail Deep Learning Break Fix Websites Cost Management Bookmarks Firefox Mobile Device Management Authorization VoIP User Error Display Twitter Identity Marketing Uninterrupted Power Supply Black Friday Smart Tech Electronic Health Records Digital Recovery Gadgets Vulnerabilities Drones Bluetooth Consulting Alt Codes Licensing eWaste IT service Test Multi-Factor Security Legal Dark Web Vendor Management Assessment Halloween Favorites Digital Payment Employees Avoiding Downtime Printer Remote Computing OneNote Cyber Monday Connectivity Laptop Files Spyware Social Humor Networking Chromebook Development Modem Managed Services Provider IBM Typing Emergency Hotspot Electronic Medical Records Cooperation Management Apps RMM Heating/Cooling Google Calendar Social Engineering Physical Security Processors CCTV Upgrades Emoji Webcam Personal Information Relocation 3D Printing Printers Cortana Work/Life Balance Travel Theft Private Cloud Unsupported Software Supercomputer Virtualization Law Enforcement Staffing Update Motion Sickness Financial Taxes Computer Repair Error Administrator Notifications Mobile Data IT Budget Regulation Web Server How To Gadget GPS Cybercrime IT Consultant Health Crowdsourcing Botnet Mobile Computing Cameras Tracking Meetings Cleaning

Latest Blog Entry

While smartphones and tablets can help businesses quite a bit, they can also be quite detrimental to their success. If you can get past the issues related to employees bringing their own devices to the workplace, then you’ll be able to save a considerable amount of time and ...

Latest News

S I M Technology launches new website!

S I M Technology is proud to announce the launch of our new website at www.simtechny.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

Read more ...