Major T-Mobile outage takes down account access, mobile app

A major T-Mobile outage is preventing customers from logging into their accounts and using the company's mobile app.
Customers saw a different error warning that the service routing the account.
T-mobile.com host and the T-Mobile for Business platform at tfb.
According to an internal system issue alert seen by BleepingComputer, T-Mobile's frontline teams also see sign-in and other errors in multiple applications.
These issues started at 12:19 PM PT and impact the employees' ability to process activations, upgrades, account modifications, and payments.
In June 2020, T-Mobile experienced another major outage following a leased fiber circuit failure from a third-party provider, leaving tens of thousands of T-Mobile users without an Internet connection and blocking them from making or receiving calls.
A T-Mobile spokesperson was not immediately available when BleepingComputer asked if this outage resulted from a cyberattack or a technical issue.
Over 150k WordPress sites at takeover risk via vulnerable plugin.
Online museum collections down after cyberattack on service provider.
Europol warns 443 online shops infected with credit card stealers.
Box cloud storage down amid 'critical' outage.


This Cyber News was published on www.bleepingcomputer.com. Publication date: Thu, 11 Jan 2024 23:35:31 +0000


Cyber News related to Major T-Mobile outage takes down account access, mobile app

Ushering in the Next Phase of Mobile App Adoption: Bolstering Growth with Unyielding Security - In recent years, mobile apps have surged in popularity providing consumers with instant access to a variety of life essentials such as finances, education, and healthcare to life's pleasures such as shopping, sports, and gaming. With the popularity ...
11 months ago Cyberdefensemagazine.com
Major T-Mobile outage takes down account access, mobile app - A major T-Mobile outage is preventing customers from logging into their accounts and using the company's mobile app. Customers saw a different error warning that the service routing the account. T-mobile.com host and the T-Mobile for Business ...
10 months ago Bleepingcomputer.com
CVE-2023-38297 - An issue was discovered in a third-party com.factory.mmigroup component, shipped on devices from multiple device manufacturers. Certain software builds for various Android devices contain a vulnerable pre-installed app with a package name of ...
6 months ago
Mobile Insecurity: Unmasking the Vulnerabilities in Your Pocket - Mobile devices have become indispensable companions in our daily lives, offering us instant access to a world of information and services. On average, mobile users interact with more than 20 applications each day, making these handheld marvels ...
10 months ago Cyberdefensemagazine.com
Microsoft Teams outage causes connection issues, message delays - Microsoft is investigating an ongoing and widespread outage impacting the users of its Teams communication platform and causing connectivity issues, login problems, and message delays. While Redmond is still working on addressing these ongoing ...
9 months ago Bleepingcomputer.com
Is Your Organization Infected by Mobile Spyware? - The surge in mobile device usage within organizations has inevitably opened the floodgates to a new kind of cyber threat-mobile spyware. The growing dependence on mobile technology has made it imperative for organizations to recognize and mitigate ...
11 months ago Blog.checkpoint.com
The Art of Securing Cloud-Native Mobile Applications - We will explore the dynamic intersection of cloud-native architecture and mobile application security, delving into the strategies and best practices essential for safeguarding sensitive data, ensuring user privacy, and fortifying against emerging ...
11 months ago Feeds.dzone.com
Mobile Device Security: Protecting Your Smartphone - To ensure the safety of your smartphone and protect your personal data from unauthorized access, it is crucial to take proactive steps to enhance mobile device security. Enable device encryption: Enable device encryption on your smartphone to protect ...
9 months ago Securityzap.com
Fake app impersonating LastPass spotted in Apple's App Store The Register - LastPass says a rogue application impersonating its popular password manager made it past Apple's gatekeepers and was listed in the iOS App Store for unsuspecting folks to download and install. A screenshot of the fake LastPass app in the Apple App ...
9 months ago Go.theregister.com
Secure Financial Apps: Proactive Measures - People are using multiple apps to transfer, invest, and save money as per their requirements. These are some of the scenarios within a financial app where cybersecurity can play a key role in averting fraudulent transactions. Of late, a lot of ...
11 months ago Feeds.dzone.com
Fake LastPass password manager spotted on Apple's App Store - LastPass is warning that a fake copy of its app is being distributed on the Apple App Store, likely used as a phishing app to steal users' credentials. The fake app uses a similar name to the genuine app, a similar icon, and a red-themed interface ...
9 months ago Bleepingcomputer.com
Majorca city Calvià extorted for $11M in ransomware attack - The Calvià City Council in Majorca announced it was targeted by a ransomware attack on Saturday, which impacted municipal services. Calvià is a historic town on the Spanish island of Majorca with a population of 50,000 and is one of Majorca's major ...
10 months ago Bleepingcomputer.com
The Limitations of Google Play Integrity API - This overview outlines the history and use of Google Play Integrity API and highlights some limitations. We also compare and contrast Google Play Integrity API with the comprehensive mobile security offered by Approov. Google provides app attestation ...
11 months ago Securityboulevard.com
AWS Root vs IAM User: What to Know & When to Use Them - In Amazon Web Services, there are two different privileged accounts. One is defined as Root User and the other is defined as an IAM User. In this blog, I will break down the differences of an AWS Root User versus an IAM account, when to use one ...
1 year ago Beyondtrust.com
Kwik Trip finally confirms cyberattack was behind ongoing outage - Two weeks into an ongoing IT outage, Kwik Trip finally confirmed that it's investigating a cyberattack impacting the convenience store chain's internal network since October 9. This outage has been causing widespread IT system disruptions and is ...
11 months ago Bleepingcomputer.com
What Do Apple's EU App Store Changes Mean for App Developers? - In order to comply with the European Union's Digital Markets Act, Apple announced on Jan. 25 changes to its payment system for app sellers in the EU, and that it was letting go of the hold its App Store has over iOS app distribution in the EU. As ...
9 months ago Techrepublic.com
Xbox is down worldwide with users unable to login, play games - The Xbox Live service is currently down due to a major outage, impacting customers worldwide and preventing them from signing into their Xbox accounts and playing games. According to a massive stream of user reports, the online gaming platform has ...
4 months ago Bleepingcomputer.com
Top Security Trends and Predictions for 2024 - Approov stands at the forefront of mobile cybersecurity: Our expansive customer base, ongoing research initiatives and the insights we collect from our live threat metrics, give us unique visibility into trends in mobile security. First, let's talk ...
11 months ago Securityboulevard.com
Increase In Mobile Threats Calls for A Proactive Mindset. - Mobile threats are always evolving in the world of business. Threats to mobile security are increasing: More than 60% of cyber attacks now occur on mobile devices, including phishing and smishing scams and password theft within organisations. One ...
11 months ago Cyberdefensemagazine.com
Cloudflare Dashboard and APIs down after data center power outage - An ongoing Cloudflare outage has taken down many of its products, including the company's dashboard and related application programming interfaces customers use to manage and read service configurations. The complete list of services whose ...
11 months ago Bleepingcomputer.com
What Can Go Wrong with Bank Online Account Opening? - Online account opening is one of the most crucial functions for banks today. They pull out their driver's license and show it to the camera on the phone or on the PC. The bank checks some data and vets the driver's license and a new account is ...
11 months ago Securityboulevard.com
How to Temporarily Deactivate Instagram? - Instagram is an amazing social platform where you can stay in touch with your friends and influencers, but sometimes it can be too much. If Instagram has become too distracting or overwhelming for you to use effectively-whether for mental peace, ...
11 months ago Hackercombat.com
Latest Information Security and Hacking Incidents - The recent global outage of Social Media Platform X caused a stir in the online community during a time when digital media predominates. Users everywhere became frustrated and curious about the cause of this extraordinary disruption when they ...
10 months ago Cysecurity.news
Microsoft 365 Outage Takes Down Teams, Exchange Online and Outlook - Microsoft experienced an outage on Tuesday, October 20th which caused major disruption to its Microsoft 365 service. It affected Teams, Exchange Online, and Outlook users and caused difficulty related to email sending and receiving, authenticating, ...
1 year ago Bleepingcomputer.com
Twilio will ditch its Authy desktop 2FA app in August, goes mobile only - The Authy desktop apps for Windows, macOS, and Linux will be discontinued in August 2024, with the company recommending users switch to a mobile version of the two-factor authentication app. Authy is an authenticator app that allows users to set up ...
10 months ago Bleepingcomputer.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)