The accounts of some global celebrities and stars have recently been compromised on Twitter, possibly due to a weak password used or the theft of social media login data.

Therefore, the user must set up a second firewall, known as the two-factor authentication function, which is available in almost all Internet services, as it provides the user with more security.

Two ways to activate login

Twitter refers to the two-factor authentication function in the name of login confirmation, and there are two ways to confirm login with a Twitter account: the smartphone authentication application, the USB security unit on the computer or the U2F security key.

When this function is activated, the user can only access the account after entering the password first, after which the code is entered from the application or the security key is installed on the computer.

Predators in the recent hacking attack on Twitter were able to announce a Bitcoin fraud through the personal pages of celebrities and community stars such as former US President Barack Obama or Amazon CEO Jeff Bezos.

These accounts are supposed to be protected by complex passwords and login confirmation function, and it appears that this electronic hacking occurred through direct access to Twitter systems.

However, the user is obligated to implement the two-factor authentication function because such attacks are not common, and the login confirmation function provides the best protection currently possible.

The user can view a detailed explanation of how this function works with the SMS service on the support and assistance pages of the Twitter network.

In any case, the user must activate the two-factor authentication function in the Twitter account's Settings menu before he can log in.

Short text messages

In the setup menu, the user appears as a third option for the two-factor authentication function, where the code can be received via SMS, which confirms the login process for the Twitter network, and this option was the only way for two-factor authentication in Twitter as of November 2019, but it has not been used by many users due to security concerns.

The hackers were already able to request the replacement of a replacement SIM card with the user name of the company providing mobile telephony services, after which the phone card was copied or the required card was stolen, then they sent a request to reset the Twitter password from the messages Short scripts for user account capture.