Twitter users must change passwords right away
On Thursday, Parag Agrawal, the chief Twitter technology officer has reported about a bug in the software. This flaw resulted in the recorded users' passwords in plain text.
It means if people in the company couldn't previously see the password, they now could. Likewise, such bug could lead to catastrophic consequences if the passwords would be exposed.
According to the experts, they haven't identified any misuse of the information or a breach. Although, users are advised to change the passwords on all platforms where it has been used.
Now, more than 330 million users should head straight to change their Twitter passwords in order to keep their accounts safe. Fortunately, the company took corresponding measures to make sure that none of such flaws would occur in the future.
A failure in hashing process led to password record
According to the official report, Twitter used a process, called hashing to protect users' passwords. Bcrypt function replaced the password with random characters and numbers to make sure that no one could identify it.
However, the passwords were recorded in plain text due to the bug:
Due to a bug, passwords were written to an internal log before completing the hashing process.
It is yet still unknown how long was the bug present before the company took measures and fixed it. Although, now the officials claim that the flaw was eliminated and users receive a pop-up with advice to change the password immediately.
Learn how to change Twitter password and protect your account in the future
First, the user should change the password on Twitter by going to the password settings page. Also, if you have used the same password on other platforms — you must change it as well.
Here are some tips to help you protect your account in the future:
- Do not reuse same passwords on multiple websites;
- Make sure to use password manager which confirms how secure your password is;
- Enable two-factor authentication that requires access to your other device (e. g. phone) to receive an authentication code before logging in;
- Always use robust antivirus software to make sure that your computer is protected from malware and ransomware attacks.
The company is deeply sorry for the inconvenience it has caused:
We are very sorry this happened. We recognize and appreciate the trust you place in us, and are committed to earning that trust every day.
Prevent websites, ISP, and other parties from tracking you
Private Internet Access is a VPN that can prevent your Internet Service Provider, the government, and third-parties from tracking your online and allow you to stay completely anonymous. The software provides dedicated servers for torrenting and streaming, ensuring optimal performance and not slowing you down. You can also bypass geo-restrictions and view such services as Netflix, BBC, Disney+, and other popular streaming services without limitations, regardless of where you are.
A VPN is also crucial when it comes to user privacy. Online trackers such as cookies can not only be used by social media platforms and other websites but also your Internet Service Provider and the government. Even if you apply the most secure settings via your web browser, you can still be tracked via apps that you are connected to the internet. Besides, privacy-focused browsers like Tor is are not an optimal choice due to diminished connection speed.
Therefore, to stay completely anonymous and prevent the ISP and the government from spying on you, you should employ Private Internet Access VPN. It will allow you to connect to the internet while being completely anonymous, prevent trackers, ads, as well as malicious content. Most importantly, you will prevent the illegal surveillance activities that NSA and other governmental institutions are performing behind your back.
Recover your lost files quickly
Unforeseen circumstances can happen at any time while using the computer: it can turn off due to a power cut, a Blue Screen of Death (BSoD) can occur, or random Windows updates can decide to reboot the machine when you went away for a few minutes. As a result, your schoolwork, important documents, and other data might be lost.
Additionally, you might also be attacked by malware that can corrupt your Windows or encrypt files with a robust encryption algorithm, and ask for a ransom in Bitcoin for the decryption tool. Cybercriminals might not deliver what they promised, however, so it is better to attempt alternative file recovery methods that could help you to retrieve at least some portion of the lost data.
Data recovery software is one of the options that could help you recover your files. Once you delete a file, it does not vanish into thin air – it remains on your system as long as no new data is written on top of it. Data Recovery Pro is recovery software that searchers for working copies of deleted files within your hard drive. By using the tool, you can prevent loss of valuable documents, school work, personal pictures, and other crucial files.