Twitter Releases New Authentication System to Reduce Risk from Hackers

By

Twitter and its users can only take so many annoying pranks and overall nastiness.

Last month, the U.S. stock market took a temporary hit from a fake Twitter message that claimed to have originated from The Associated Press. Earlier in February, some 250,000 Twitter users had to reset credentials after passwords, user names and e-mail addresses were stolen. And in April, CBS News' programs "60 Minutes" and "48 Hours" also had their Twitter accounts hacked.

Now, the popular micro-blogging site has come up with an authentication method to improve security. It is called login verification.

“This is a form of two-factor authentication,” Twitter security specialist Jim O’Leary explained in a blog post. “When you sign into twitter.com, there’s a second check to make sure it’s really you. You’ll be asked to register a verified phone number and a confirmed e-mail address.”

To generally understand what Twitter is up to, a video explains the new method, telling users, “Help Us Help You. Protect Your Account.”

Here is how it works: go on the account settings page. Select “Require a verification code when I sign in.” Click on link to “add a phone” and follow the prompts. Enter a six-digit code sent to a telephone via SMS each time signing in to twitter.com.

“With login verification enabled, your existing applications will continue to work without disruption,” the micro-blogging site said. “If you need to sign in to your Twitter account on other devices or apps, visit your applications page to generate a temporary password to login and authorize that application.”

More security improvements may be on the way – and O’Leary says that “much of the server-side engineering work required to ship this feature has cleared the way for us to deliver more account security enhancements in the future. Stay tuned.”

The new authentication system is similar to the one offered by Facebook – and will help Twitter to improve its reputation as a secure site, CNET reports.

“The additional security measure certainly complicates the login process, but the extra step is one many Twitter users, particularly brand users, will welcome with open arms,” CNET said.

Also, the move by Twitter, if it’s successful, is important. Not only were there temporary losses on Wall Street due to the fake AP tweet, the world was incorrectly told that two explosions took place in the White House and that President Barack Obama was injured, according to TechZone360.  

Yet, there are still issues with shared accounts under the new method.

“It may not help shared accounts like big brands and news agencies where multiple people need to be able to log in and out but only one phone number can get the login verification codes,” TechCrunch warned. “The brands and news outlets whose accounts are the most valuable to hackers may not benefit from the feature. They can only set one phone number as the recipient of the two-factor authentication codes, but may have several staff members who need to access the account. If they enabled it, whoever carried the phone registered with Twitter would have to relay the code to all the other staffers to get it to whoever needed it. That hassle might prevent shared accounts from turning on login verifications, and so the hackings may continue.”

There are other limitations to the new method, as well. It doesn’t work with mobile apps. Also, someone needs to have an operating cell phone to receive the text message. Perhaps these limitations will be addressed soon by Twitter.

But it was clear that some steps needed to be taken by Twitter quickly. Security breaches into Twitter accounts are not limited to the famous and powerful. Regular folks are attacked, too.

"We occasionally hear from people whose accounts have been compromised by e-mail phishing schemes or a breach of password data elsewhere on the Web," O’Leary said in the blog post.




Edited by Alisen Downey
Get stories like this delivered straight to your inbox. [Free eNews Subscription]

TechZone360 Contributor

SHARE THIS ARTICLE
Related Articles

Choosing the right dedicated server: A crucial guide for website hosting

By: Contributing Writer    9/5/2024

Deciding how to host your website can be daunting, especially when considering a dedicated server. This type of hosting solution offers many benefits,…

Read More

How Web Application Firewalls Protect Against Common Threats

By: Contributing Writer    8/29/2024

Despite organizations' best efforts, cyberthreats are more prevalent than ever. The most common threats are becoming more dangerous for your data and …

Read More

Paying Attention to the User Experience: Nureva's New App Simplifies Workspace Audio Management

By: Alex Passett    8/27/2024

After launching its Nureva App in beta earlier this summer, Nureva has announced that this companion app is now fully available to HDL310 and HDL410 a…

Read More

Emerging AI Trends Set to Revolutionize Crypto Trading

By: Contributing Writer    8/26/2024

Anyone who wants to achieve success in crypto trading is well-aware that they need to keep up with the trends. The digital currency market moves fast …

Read More

The technology behind online video poker: welcome to the future

By: Contributing Writer    8/12/2024

Long gone are the days when the most we could do with our cell phones was call and play Snake (If you were born before 2000, you probably remember thi…

Read More