Twitter implements system that identifies suspicious login behavior

Share this article:

Seeking to better protect user accounts, Twitter has implemented a system that identifies suspicious login behavior by analyzing location data, the device being used and login history, according to a Thursday post by Mollie Vandor, product manager with Twitter.

Whenever a login attempt is deemed suspicious, Twitter will only grant access to the account after the user answers a unique question that only they will know, according to Vandor, who added that an email will be sent to alert users that unusual activity has been detected.

Vandor also announced that Twitter implemented a new password reset process.

Now, when users lose or forget their Twitter passwords, they can choose to send the reset information to any email address or phone number associated with the account, according to Vandor, who added that the process has been improved for iOS and Android devices, as well.

Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

More in News

Reported breaches involving zero-day bug at JPMorgan Chase, other banks

Reported breaches involving zero-day bug at JPMorgan Chase, ...

Hackers exploited a zero-day vulnerability and gained access to sensitive information from JPMorgan Chase and at least four other financial institutions, reports indicate.

Data on 97K Bugzilla users posted online for about three months

During a migration of the testing server for test builds of Bugzilla software, data on about 97,000 Bugzilla users was inadvertently posted publicly online.

Chinese national had access to data on 5M Arizona drivers, possible breach ...

Although Lizhong Fan left the U.S. in 2007, the agencies responsible for giving him access to Americans' personal information have yet to disclose the details of the case to the public.