Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Identity & Access

Twitter Users Can Now Secure Accounts With Multiple Security Keys

Twitter on Monday announced that users with two-factor authentication (2FA) enabled can now use multiple security keys to protect their accounts.

Twitter on Monday announced that users with two-factor authentication (2FA) enabled can now use multiple security keys to protect their accounts.

The social platform has had support for security keys for desktop users for some time, and made the feature available to iOS and Android users too in December 2020.

Now, the company allows users to take advantage of multiple security keys when securing their accounts, regardless of whether on a mobile device or on desktop.

“Secure your account (and that alt) with multiple security keys. Now you can enroll and log in with more than one physical key on both mobile and web,” the company announced.

To use security keys for account protection, users need to enable 2FA via text message or authentication application, select Security Key, and then enter their passwords when prompted, to begin the setup process.

After clicking Start, users can connect their physical security key, either via a USB port or via Bluetooth, after which they will need to touch the button on the key and then follow the on-screen steps to complete the setup process.

Security keys that have been added are displayed in the “Manage security keys” section, under “Two-factor authentication,” allowing users to easily manage them (rename, delete, or add new ones, as needed).

The social platform also points out that the latest version of a supported browser (including Chrome, Edge, Firefox, Opera, and Safari) is needed to add or log in to a Twitter account with a security key.

Twitter also revealed that it will soon provide users with the ability to employ security keys for authentication even if they do not have other methods enabled. However, the company hasn’t provided a specific timeframe for when the feature will become available.

Related: Twitter Shuts Down Four Networks of State-Sponsored Disinformation Accounts

Related: New YubiKey 5C NFC Security Key Brings NFC, USB-C Connections

Related: Researchers Show Google’s Titan Security Keys Can Be Cloned

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.

Register

Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.

Register

Expert Insights

Related Content

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Password management firm LastPass says the hackers behind an August data breach stole a massive stash of customer data, including password vault data that...

Application Security

Microsoft on Tuesday pushed a major Windows update to address a security feature bypass already exploited in global ransomware attacks.The operating system update, released...

Application Security

Electric car maker Tesla is using the annual Pwn2Own hacker contest to incentivize security researchers to showcase complex exploit chains that can lead to...

Identity & Access

Strata Identity has raised $26 million in a Series B funding round led by Telstra Ventures, with additional investment from Forgepoint Capital, Innovating Capital,...