Cyber security news for all


    Twitter 2FA Method Hack Authentication

    Twitter no longer makes double protection of the user account when logging in dependent solely on the cell phone number. Two-factor authentication (2FA) now also works with an authenticator app on the smartphone or a special USB stick on the computer.

    Twitter 2FA

    Until now, it was only possible to receive registration codes via SMS, which had to be entered in addition to the password. The selected 2FA method must always be activated in the settings of the Twitter account before you can log in with it.

    Always Trouble With Cell Phone Numbers And SMS

    Many Twitter customers had not used the SMS authentication method because of security concerns. Attackers have often managed to order a replacement SIM card from the provider on behalf of their victim, copy their SIM card or intercept an ordered card. They could then send an SMS to Twitter to request a code to reset their password and take over the victim’s account.

    The various 2FA options are based on web authentication. This authentication method has officially raised the responsible standardization body to an Internet standard. Authenticator apps, U2F USB sticks or biometric registration methods such as fingerprint sensors are referred to as identification components. Web authentification can not only be used for 2FA, but can also be used for password free log-in to online services.

    With the Tailored Audiences advertising program, companies can upload marketing lists with customer data to Twitter and play advertising with all Twitter users whose phone number or email address is stored on Twitter and on the marketing list. However, personal data was not passed on to external companies, writes Twitter. How many users are affected? Twitter cannot say, says the statement. “We very much regret this and are taking steps to ensure that we do not make such a mistake again,” writes Twitter.

    Recent Articles

    Unclear cyber attacks that target Covid-19 vaccine campaign

    Security researchers have discovered some cyber attacks that are targeted against the delivery of vaccine against COVID. The targeted attacks began in 2 months...

    New malware called Egregor is on the rise

    New malware is on the rise. The Egregor malware has only been in active for 2 months, but it is already becoming apparent that...

    Anyone with a smartphone can become a victim of cyber-mobbing

    Cyber-mobbing is becoming a huge risk in the current COVID crisis. According to a study, almost 20 percent of students in Germany are exposed...

    macOS Trojans: Traces lead to Vietnam

    Security researchers have discovered a new macOS Trojans. Behind this could be a well known hacker group that has spied on Vietnamese dissidents in...

    Court forces Tutanota to perform a surveillance function

    Tutanota email only stores its user mails in encrypted form and cannot read them itself. Tutanota is one of the few email providers that...

    Related Stories

    Leave A Reply

    Please enter your comment!
    Please enter your name here

    Stay on op - Ge the daily news in your inbox