DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

MA: New Bedford: public release of info on cyber attack could put city at further risk

Posted on July 13, 2019 by Dissent

Jack Spillane reports:

Cyber professionals have “strongly advised” the city against providing any details about the impacts of a computer virus that has shut down municipal computers for more than a week.

Jonathan Carvalho, the city’s public information officer, released a statement late Friday that said New Bedford continues to implement restoration plans on its municipal computer network. For most of a week the city has provided little information about what is going on with a virus that has at least shut down some of the computers at both City Hall and in the Fire Department. It is not known what other departments may be affected although officials have said the police are not involved and neither is the 911 emergency network.

The city has refused to say exactly how many computers are down, where they are located, the name of the cyber security consultant it is working with or how much money the shutdown may be costing New Bedford. The city has said it has insurance against meltdown that could take out the network.

Read more on South Coast Today.

Related posts:

  • HIPAA Security Rule Facility Access Controls – What are they and how do you implement them?
Category: Government SectorMalware

Post navigation

← Syracuse schools’ hit by ransomware; ransom demands increase as days go by
Rajya Sabha passes Aadhaar amendment Bill, allows to file complaint in case of security breach →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Integrated Oncology Network victim of phishing attack; multiple locations affected (2)
  • HHS’ Office for Civil Rights Settles HIPAA Privacy and Security Rule Investigation with Deer Oaks Behavioral Health for $225k and a Corrective Action Plan
  • HB1127 Explained: North Dakota’s New InfoSec Requirements for Financial Corporations
  • Credit reports among personal data of 190,000 breached, put for sale on Dark Web; IT vendor fined
  • Five youths arrested on suspicion of phishing
  • Russia Jailed Hacker Who Worked for Ukrainian Intelligence to Launch Cyberattacks on Critical Infrastructure
  • Kentfield Hospital victim of cyberattack by World Leaks, patient data involved
  • India’s Max Financial says hacker accessed customer data from its insurance unit
  • Brazil’s central bank service provider hacked, $140M stolen
  • Iranian and Pro-Regime Cyberattacks Against Americans (2011-Present)

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • On July 7, Gemini AI will access your WhatsApp and more. Learn how to disable it on Android.
  • German court awards Facebook user €5,000 for data protection violations
  • Record-Breaking $1.55M CCPA Settlement Against Health Information Website Publisher
  • Ninth Circuit Reviews Website Tracking Class Actions and the Reach of California’s Privacy Law
  • US healthcare offshoring: Navigating patient data privacy laws and regulations
  • Data breach reveals Catwatchful ‘stalkerware’ is spying on thousands of phones
  • Google Trackers: What You Can Actually Escape And What You Can’t

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.