How to Check if Your Twitter Account has been Hacked

Have you ever wondered if your Twitter account has been hacked and who may have gained access to it?

While a bit late to the party, after Google and Facebook, Twitter now lets you know any and all devices that have logged into your account. Twitter has also rolled out a new security feature for its users, dubbed Apps and Sessions. This allows you to know which apps and devices are accessing your Twitter Account along with  the location of those devices.

To find out the current and all past logged in devices and locations, follow these steps.

Check Twitter Login Sessions On a Smartphone

 

  • Open the Twitter app, and head on to your profile
  • Tap on ‘Settings and privacy’ section
  • Inside the section, select ‘Account’
  • Once inside the option, tap on ‘Apps and sessions’

 

 

Check Twitter Login Sessions On Desktop Or Laptop

The process is almost the same using a desktop or laptop.

  1. Open Twitter and tap on the photo icon on the top right corner where you find all the account settings.
  2. Tap on ‘Settings and privacy’ section
  3. Inside the section, scroll down to ‘Apps and devices’

Once you tap ‘Apps and sessions’ on mobile or ‘Apps and devices’ option on desktop, you will be shown a list of all devices active on your Twitter account in the last month, as well as location they’re in, along with a list of third-party apps that have access to your Twitter account.

Now, you can click on the devices to see more information, including the name of the device your Twitter account was accessed on, what browser it was used on, date and time, and the approximate location the device was used in.

If you found any suspicious device that you never logged in, you can revoke back the access in just one click. This will close any open session, preventing people with your Twitter account access to log into your account again.

However, you are highly recommended to change your password as well as recovery and 2-step verification settings, if you found such situation, as this will prevent people that may have your current password from signing back in. Guide provided by www.thehackernews.com