Twitter makes it harder for criminals to hack your account
Hardware security keys can now be used for mobile logins
Twitter has released a new update that allows hardware security keys to be used when logging in from mobile devices. The social network confirmed that switching to a new security protocol last year has meant that it is now able to offer the same level of robust protection to mobile users as it does to those logging in via desktop PCs and laptops.
Hardware security keys were initially rolled out by Twitter in 2018, allowing desktop users of the social media platform to utilize a physical authentication option. However, some technical limitations meant that this approach wasn’t supported outside of the Twitter web app.
Twitter has now confirmed that following the decision to adopt the WebAuthn security protocol in May last year, it is now in a position to offer hardware security keys to mobile account users.
- Check out our list of the best password manager software around
- Here's our list of the best business password management solutions
- We've built a list of the best password generators right now
Security is key
Hardware keys have become increasingly popular as a security tool in recent times as they make it practically impossible for some forms of cyberattack to take place. Earlier this year, for example, Twitter provided its own staff with security keys in response to a hack that allowed attackers to spread a cryptocurrency scam.
What’s more, there is a growing acceptance that other forms of two-factor authentication, particularly those that use SMS messaging or voice calls, remain vulnerable. Hardware security keys are also more widely available today, with some specifically catering to mobile devices.
Although the launch of security keys for mobile logins will be welcomed, it will probably not be enough to restore Twitter’s damaged reputation in the world of online security. Its employees recently came top of Dashlane’s list of the worst password offenders of 2020.
- Here's our list of the best identity management software around
Via TechCrunch
Are you a pro? Subscribe to our newsletter
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
Barclay has been writing about technology for a decade, starting out as a freelancer with ITProPortal covering everything from London’s start-up scene to comparisons of the best cloud storage services. After that, he spent some time as the managing editor of an online outlet focusing on cloud computing, furthering his interest in virtualization, Big Data, and the Internet of Things.