How to do a security check on this social network
Have you ever wondered if someone has accessed your Twitter account in an illegitimate way? Do you know when and how it could have happened?
Well, now Twitter can help you to find out if your account is safe from hackers. First it was Google and Facebook; now, experts in ethical hacking recommend testing the new Twitter feature, which allows you to view all devices (laptop, phone, tablet and others) connected to your Twitter account.
Twitter recently launched a new security feature for its users, called “Applications and sessions”, that lets you know which apps and devices access your Twitter account, along with the location of those devices.
To find the devices, as well as their current and previous locations that were logged on and that had access to your Twitter account for the last two months, follow these steps:
For smartphone security check:
- Start the Twitter app
- Press the “Settings and privacy” menu
- In this section, select “Account”
- Once you have chosen this option, select “Apps and Sessions”
For desktop or laptop security check (the process is almost the same)
- Open Twitter and select the photo icon in the upper right corner where you will find all the account settings
- Select the “Privacy and Security” section
- In this section, select the “Apps and Devices” option
Once you have pressed “Apps and sessions” in the mobile app or “Apps and devices” on the desktop website, you will be shown a list of all the active devices in your Twitter account in the last month, as well as the location where they’ve been found, along with a list of third-party apps that have access to your Twitter account.
On this page you can click on the devices to see more information, including the name of the device that was accessed to your Twitter account, the browser in which it was used, the date and time, and the approximate location on which the device was used.
If you find any suspicious activity, specialists in ethical hacking from the International Institute of Cyber Security recommend revoke the access from the device in question, option included on the same page. This will close any open session, preventing people with your Twitter account from accessing to log in again to your account.
Similarly, experts in ethical hacking recommend changing your passwords and enabling two-step authentication, as this will prevent people who may have their current password from re-logging in.
Working as a cyber security solutions architect, Alisa focuses on bug bounty and network security. Before joining us she held a cyber security researcher positions within a variety of cyber security start-ups. She also experience in different industry domains like finance, healthcare and consumer products.