Twitter 正在通知所有的3.3亿用户修改他们的密码,因为系统 bug 这些密码被泄露在 Twitter 内部系统里了。
Twitter 称他们是自己发现这个问题的,目前并没有用户帐户被盗用的迹象。这个系统错误让用户的密码直接出现在一个内部日志里面,也就是说,看到这个内部日志的 Twitter 员工就会知道用户的密码。尽管公司称他们相信没有人已经获取敏感的信息,但公司还是通知用户尽快修改密码。
公司还说他们会采取措施避免同样的错误再次发生。
来源: Business Insider
We have a curated list of the most noteworthy news from all across the globe. With any subscription plan, you get access to exclusive articles that let you stay ahead of the curve.
We have a curated list of the most noteworthy news from all across the globe. With any subscription plan, you get access to exclusive articles that let you stay ahead of the curve.
We have a curated list of the most noteworthy news from all across the globe. With any subscription plan, you get access to exclusive articles that let you stay ahead of the curve.
/ forever
Sign up with just an email address and you get access to this tier instantly.
/ year
Pay now and you get access to exclusive news and articles for a whole year.
/ month
By agreeing to this tier, you are billed every month after the first one until you opt out of the monthly subscription.
/ forever
Sign up with just an email address and you get access to this tier instantly.
/ year
Pay now and you get access to exclusive news and articles for a whole year.
/ month
By agreeing to this tier, you are billed every month after the first one until you opt out of the monthly subscription.
We have a curated list of the most noteworthy news from all across the globe. With any subscription plan, you get access to exclusive articles that let you stay ahead of the curve.
― Advertisement ―
Twitter 正在通知所有的3.3亿用户修改他们的密码,因为系统 bug 这些密码被泄露在 Twitter 内部系统里了。
Twitter 称他们是自己发现这个问题的,目前并没有用户帐户被盗用的迹象。这个系统错误让用户的密码直接出现在一个内部日志里面,也就是说,看到这个内部日志的 Twitter 员工就会知道用户的密码。尽管公司称他们相信没有人已经获取敏感的信息,但公司还是通知用户尽快修改密码。
公司还说他们会采取措施避免同样的错误再次发生。
来源: Business Insider
We have a curated list of the most noteworthy news from all across the globe. With any subscription plan, you get access to exclusive articles that let you stay ahead of the curve.
Copyright Newspaper Theme, by tagDiv.