{"id":44330,"date":"2024-02-25T20:43:02","date_gmt":"2024-02-26T01:43:02","guid":{"rendered":"https:\/\/www.technewsday.com\/?p=44330"},"modified":"2024-02-25T20:43:14","modified_gmt":"2024-02-26T01:43:14","slug":"att-outage-blamed-on-botched-update","status":"publish","type":"post","link":"https:\/\/technewsday.com\/staging\/att-outage-blamed-on-botched-update\/","title":{"rendered":"AT&#038;T outage blamed on botched update"},"content":{"rendered":"<p>Last week&#8217;s wireless service blackout, leaving tens of thousands of AT&amp;T customers disconnected, was traced back to a &#8220;botched update&#8221; amidst &#8220;network expansion efforts.&#8221;<\/p>\n<p>AT&amp;T owned up to the mishap, clarifying that the disruption wasn&#8217;t the work of cyber attackers but rather an &#8220;incorrect process&#8221; during their network upgrade. The vague explanation has left many wondering about the specifics.<\/p>\n<p>The outage&#8217;s impact was significant, with over 70,000 problem reports flooding DownDetector by the morning. However, AT&amp;T was quick to respond, restoring three-quarters of its network by midday and achieving full recovery by the afternoon. Despite the swift action, the Federal Communications Commission (FCC) has launched an investigation, underlining the outage&#8217;s severity and its potential threat to public safety, including potentially hindering 911 calls.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Last week&#8217;s wireless service blackout, leaving tens of thousands of AT&amp;T customers disconnected, was traced back to a &#8220;botched update&#8221; amidst &#8220;network expansion efforts.&#8221; AT&amp;T owned up to the mishap, clarifying that the disruption wasn&#8217;t the work of cyber attackers but rather an &#8220;incorrect process&#8221; during their network upgrade. The vague explanation has left many [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":44331,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1278,215,957],"tags":[241,275],"class_list":["post-44330","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-infrastructure","category-top-stories","category-top-women-in-cybersecurity","tag-att","tag-top-story"],"acf":[],"_links":{"self":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/44330","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/comments?post=44330"}],"version-history":[{"count":2,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/44330\/revisions"}],"predecessor-version":[{"id":44333,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/44330\/revisions\/44333"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/media\/44331"}],"wp:attachment":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/media?parent=44330"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/categories?post=44330"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/tags?post=44330"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}