How To Check If Your Twitter Account Has Been Hacked

Did you ever wonder if your Twitter account has been hacked and who had managed to gain access and when it happened?

Twitter now lets you know this.

After Google and Facebook, Twitter now lets you see all the devices—laptop, phone, tablet, and otherwise—logged into your Twitter account.

Twitter has recently rolled out a new security feature for its users, dubbed Apps and Sessions, allowing you to know which apps and devices are accessing your Twitter account, along with the location of those devices.

In order to find out current and all past logged in devices and locations where your Twitter account was accessed for the last couple months, follow these steps:

Check Twitter Login Sessions On Smartphone:

twitter account security login sessions
  1. Open the Twitter app, and head on to your profile
  2. Tap on ‘Settings and privacy’ section
  3. Inside the section, select ‘Account’
  4. Once inside the option, tap on ‘Apps and sessions’

Check Twitter Login Sessions On Desktop Or Laptop:

Twitter Login Sessions

The process is almost the same using a desktop or laptop.

  1. Open Twitter and tap on the photo icon on the top right corner where you find all the account settings.
  2. Tap on ‘Settings and privacy’ section
  3. Inside the section, scroll down to ‘Apps and devices’

Once you tap ‘Apps and sessions’ on mobile or ‘Apps and devices’ option on desktop, you will be shown a list of all devices active on your Twitter account in the last month, as well as location they’re in, along with a list of third-party apps that have access to your Twitter account.

Now, you can click on the devices to see more information, including the name of the device your Twitter account was accessed on, what browser it was used on, date and time, and the approximate location the device was used in.

If you found any suspicious device that you never logged in, you can revoke back the access in just one click. This will close any open session, preventing people with your Twitter account access to log into your account again.

However, you are highly recommended to change your password as well as recovery and 2-step verification settings, if you found such situation, as this will prevent people that may have your current password from signing back in.

Articles You May Like

North Korean Group TA444 Shows ‘Startup’ Culture, Tries Numerous Infection Methods
Hackers Deploy Open-Source Tool Sliver C2, Replacing Cobalt Strike, Metasploit
Report: Stripe tried to raise more funding at a $55B-$60B valuation
Black Basta Deploys PlugX Malware in USB Devices With New Technique
The thing we thought was happening with robotic investments is definitely happening

Leave a Reply

Your email address will not be published. Required fields are marked *