Twitter makes it harder for criminals to hack your account

Twitter
(Image credit: Shutterstock)

Twitter has released a new update that allows hardware security keys to be used when logging in from mobile devices. The social network confirmed that switching to a new security protocol last year has meant that it is now able to offer the same level of robust protection to mobile users as it does to those logging in via desktop PCs and laptops.

Hardware security keys were initially rolled out by Twitter in 2018, allowing desktop users of the social media platform to utilize a physical authentication option. However, some technical limitations meant that this approach wasn’t supported outside of the Twitter web app.

Twitter has now confirmed that following the decision to adopt the WebAuthn security protocol in May last year, it is now in a position to offer hardware security keys to mobile account users.

Security is key

Hardware keys have become increasingly popular as a security tool in recent times as they make it practically impossible for some forms of cyberattack to take place. Earlier this year, for example, Twitter provided its own staff with security keys in response to a hack that allowed attackers to spread a cryptocurrency scam.

What’s more, there is a growing acceptance that other forms of two-factor authentication, particularly those that use SMS messaging or voice calls, remain vulnerable. Hardware security keys are also more widely available today, with some specifically catering to mobile devices.

Although the launch of security keys for mobile logins will be welcomed, it will probably not be enough to restore Twitter’s damaged reputation in the world of online security. Its employees recently came top of Dashlane’s list of the worst password offenders of 2020.

Via TechCrunch

Barclay Ballard

Barclay has been writing about technology for a decade, starting out as a freelancer with ITProPortal covering everything from London’s start-up scene to comparisons of the best cloud storage services.  After that, he spent some time as the managing editor of an online outlet focusing on cloud computing, furthering his interest in virtualization, Big Data, and the Internet of Things. 

Latest in Pro
cybersecurity
What's the right type of web hosting for me?
Security padlock and circuit board to protect data
Trust in digital services around the world sees a massive drop as security worries continue
Hacker silhouette working on a laptop with North Korean flag on the background
North Korea unveils new military unit targeting AI attacks
An image of network security icons for a network encircling a digital blue earth.
US government warns agencies to make sure their backups are safe from NAKIVO security issue
Laptop computer displaying logo of WordPress, a free and open-source content management system (CMS)
This top WordPress plugin could be hiding a worrying security flaw, so be on your guard
construction
Building in the digital age: why construction’s future depends on scaling jobsite intelligence
Latest in News
Ray-Ban Meta Smart Glasses
Samsung's rumored smart specs may be launching before the end of 2025
Apple iPhone 16 Review
The latest iPhone 18 leak hints at a major chipset upgrade for all four models
Quordle on a smartphone held in a hand
Quordle hints and answers for Monday, March 24 (game #1155)
NYT Strands homescreen on a mobile phone screen, on a light blue background
NYT Strands hints and answers for Monday, March 24 (game #386)
NYT Connections homescreen on a phone, on a purple background
NYT Connections hints and answers for Monday, March 24 (game #652)
Quordle on a smartphone held in a hand
Quordle hints and answers for Sunday, March 23 (game #1154)