Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

12/17/2009
03:30 PM
50%
50%

Massive Outage Hits BlackBerry Service

RIM's Internet e-mail system plagued by nationwide disruption much of Thursday.

Research In Motion's BlackBerry Internet Service e-mail system suffered a continent-wide disruption for several hours Thursday.

Reports indicated the service went down around 3 a.m. EST, possibly as a result of a maintenance check, and impacted users throughout the U.S. and Canada.

RIM stated later in the day that full service to its BIS network had been restored, but that users might still experience a slowdown as it catches up with e-mails sent during the shutdown.

"Some customers may still experience delays as e-mail queues are processed," RIM said in a statement. "RIM is continuing to investigate the cause of the issue and apologizes for any inconvenience," the company said.

The outage hit Blackberry services offered by numerous carriers, including Sprint Nextel, AT&T, Verizon Wireless, and Canada's Rogers. The trouble appeared to be limited to RIM's consumer-oriented Internet service, and did not affect corporate users who send messages through a BlackBerry Enterprise Server.

"Phone services, browsing and PIN-to-PIN messaging are not impacted," a RIM spokesperson told The Toronto Star.

Some e-commerce sites actually tried to turn the outage into a profit opportunity. Crackberry.com, which offers an assortment of BlackBerry accessories, held an "e-mail outage sale."

Some users on the site's forum, however, were less than impressed with RIM.

"It feels like almost a monthly occurrence that I see BIS outages reported," wrote forum member DrewDT. "Isn't e-mail reliability one of the cornerstone's of BlackBerry's reputation and success?" wrote the member.

Posts on the forum indicate that the outage may even have spread to South America, as one user reported that service was unavailable in Caracas, Venezuela.

Investors shrugged off the news, as shares of RIM were off just .45%, to $68.08, in late-day trading Thursday.

Application mobilization tools are both more effective and more confusing than ever. To develop this report, InformationWeek Analytics polled nearly 700 business technology professionals and interviewed mobile application experts. Download the report here (registration required).

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Why Vulnerable Code Is Shipped Knowingly
Chris Eng, Chief Research Officer, Veracode,  11/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-14318
PUBLISHED: 2020-12-03
A flaw was found in the way samba handled file and directory permissions. An authenticated user could use this flaw to gain access to certain file and directory information which otherwise would be unavailable to the attacker.
CVE-2020-2320
PUBLISHED: 2020-12-03
Jenkins Plugin Installation Manager Tool 2.1.3 and earlier does not verify plugin downloads.
CVE-2020-2321
PUBLISHED: 2020-12-03
A cross-site request forgery (CSRF) vulnerability in Jenkins Shelve Project Plugin 3.0 and earlier allows attackers to shelve, unshelve, or delete a project.
CVE-2020-2322
PUBLISHED: 2020-12-03
Jenkins Chaos Monkey Plugin 0.3 and earlier does not perform permission checks in several HTTP endpoints, allowing attackers with Overall/Read permission to generate load and to generate memory leaks.
CVE-2020-2323
PUBLISHED: 2020-12-03
Jenkins Chaos Monkey Plugin 0.4 and earlier does not perform permission checks in an HTTP endpoint, allowing attackers with Overall/Read permission to access the Chaos Monkey page and to see the history of actions.