Home Business IT Security Mobility Twitter is serious about security
Twitter is serious about security Featured

Twitter is ramping up its security even further, today launching an iOS and Android app update with 'login verification'.

The optional feature means users who turn it on will need their phone on them when using Twitter on desktop. It can be turned on inside the Security tab in the application's Settings.

Once activated, the iOS and Android application is the only way to approve Twitter.com sign-in requests, meaning if you lose your phone you'll need a backup code generated by the application.

The new feature comes just months after the social media giant introduced SMS-based login verification, and follows an 'anti-abuse' button introducted last week.

Users opting to utilise these security measures will need a confirmed email address and phone number for activation.

As part of the new feature announced today users will also be notified in real-time their account is being hacked.

"When a login request is made, you will see browser details and approximate location in the app. If you receive an approval request from halfway across the world, you may be getting phished," Twitter said.

According to the announcement on Twitter’s blog, the new login verification includes the following features:

  • No phone number required: By using push messaging and in-application approvals, users no longer need to provide a phone number to use login verification. If a user manages multiple Twitter accounts, but only has one phone number, they can opt all of the accounts into the login verification.
  • Broader international support: While login verification via SMS has been available through supported mobile carriers worldwide, it still didn’t cover everybody. Now, all that is needed for the new login verification enrollment is an Internet connection and one of Twitter’s supported apps.
  • Backup code generation: Backup codes generated in the application can be recorded and stored in a safe place to access an account on Twitter.com if a user’s phone is missing.
  • More context: Users will see browser details and approximate location in the app when a login request is made. If a request is coming from halfway around the world, the added context can help determine if an account is getting phished.

For more information on the new security measure check out Twitter's blog announcement here.

FREE CLOUD BACKUPS MANAGEMENT WEBINAR

Are your technicians spending too much time just managing your clients cloud backups?

Backups are an important part of any IT business but they should not consume more than their fair share of time and money.

Discover how to reduce the amount of time & money spent managing your Cloud Backups during this Free Webinar.

REGISTER FOR FREE WEBINAR!

FREE NETWORKING SERVICES CASE STUDY

As one of the world’s largest social networking services, Facebook handles a lot of user information, and requires input from an astounding range of stakeholders 24 hours a day, 7 days a week — from both inside and outside the business.

Discover how Facebook was helped to connect remote employees, vendors, consultants, and partners to applications and web services quickly and reliably - without risking sensitive data.

GET CASE STUDY!

GET THE IT BUDGET YOU WANT

Explore your Network Treasure Trove to get the IT Budget you want

With Australian businesses projected to spend over $78.7 Billion why does it feel like you can never get the budget you need?.

In most cases your budget will get approved because the proposals are not only technically correct, but also provide good, credible evidence on how the spend aligns with key business objectives.

Did you know that your Network Monitoring tool can help you build a comprehensive business case without an MBA?

HERE ARE 8 TIPS TO GET THE IT BUDGET YOU WANT.

CLICK HERE!

David Swan

David Swan is a tech journalist from Melbourne and is iTWire's Associate Editor. Having started off as a games reviewer at the age of 14, he now has a degree in Journalism from RMIT (with Honours) and owns basically every gadget under the sun.

Connect

 

 

 

 

Join the iTWire Community and be part of the latest news, invites to exclusive events, whitepapers and educational materials and oppertunities.
Why do I want to receive this daily update?
  • The latest features from iTWire
  • Free whitepaper downloads
  • Industry opportunities