Notebookcheck Logo

If you are on Twitter, you should change your password now

Image: Twitter (w/ edits)
Image: Twitter (w/ edits)
Twitter discovered a bug in their password hashing process that created a plaintext log containing user passwords. While the social media platform does not believe any breach has occurred, they urged their entire user base to reset their passwords as soon as possible.

Twitter users may want to head over to the popular social media site and update their passwords, the company suggested today. Due to a bug in their password hashing process, user passwords were copied to a plaintext log file prior to being masked, creating an easily readable record of passwords.

Thankfully, Twitter found the bug internally and doesn’t believe any malicious parties have accessed the logs. The company also reiterated that the issue did not involve a breach of any kind. The social media platform did not disclose how many users the bug affected, but the fact that they’re prompting everyone to reset their passwords hints that the problem was prolific. There are currently over 336 million registered users on the platform.

Twitter also recommended that users change their password to one that was unique to the site and to enable two-factor authentication via their account settings. Two-factor authentication requires approval on a separate device or through a separate service once a password is entered and is widely regarded as one of the better methods through which users can secure login information and other data.

You can reset your password by logging into Twitter and navigating to the Settings page. See the images below for further reference.

Image: self
Image: self

Source(s)

static version load dynamic
Loading Comments
Comment on this article
Please share our article, every link counts!
> Expert Reviews and News on Laptops, Smartphones and Tech Innovations > News > News Archive > Newsarchive 2018 05 > If you are on Twitter, you should change your password now
Sam Medley, 2018-05- 3 (Update: 2018-05- 3)