Endpoint

7/16/2016
08:00 AM
Connect Directly
Twitter
Twitter
RSS
E-Mail
50%
50%

Staying Cyber Safe At The Olympics

Travel tips and more in hostile environments abroad.
Previous
1 of 10
Next

Image Source: Adobe Stock

Image Source: Adobe Stock

With the Olympics only a couple of weeks away, plenty of excited and nervous travelers may already have their safety worries about crime, the Zika virus or water quality issues in Brazil. But in this digital era, protection from those physical world realities shouldn't be the only thing travelers should think about. In the run-up to the Olympics, cybersecurity experts and government officials alike are warning that the risk of identity theft, online scams and digital surveillance will be very real for travelers heading to Rio come August. Here are some of the common tips they offer consumers for staying cyber safe while watching the games. These are the types of common sense advice that security pros should think about passing along to friends, neighbors and their corporate users.

 

Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading.  View Full Bio

Previous
1 of 10
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Whoopty
50%
50%
Whoopty,
User Rank: Ninja
7/18/2016 | 6:48:29 AM
'Common Sense'
Probably the best advice in this post is the common sense tab. Technology so often just works these days that it's easy to be complacent until you're caught out. Making sure your passwords are strong, your devices locked down as much as possible and your important information encrypted, are great methods of staying safe at any time.

And those same methods will apply just as much during big events like the olympics as well.

Hopefully this encourages people to apply those practices after the games too.
Google Engineering Lead on Lessons Learned From Chrome's HTTPS Push
Kelly Sheridan, Staff Editor, Dark Reading,  8/8/2018
White Hat to Black Hat: What Motivates the Switch to Cybercrime
Kelly Sheridan, Staff Editor, Dark Reading,  8/8/2018
PGA of America Struck By Ransomware
Dark Reading Staff 8/9/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Now about that mortgage refinance offer from Wells Fargo .....
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-7097
PUBLISHED: 2018-08-14
A security vulnerability was identified in 3PAR Service Processor (SP) prior to SP-4.4.0.GA-110(MU7). The vulnerability may be exploited remotely to allow cross-site request forgery.
CVE-2018-7098
PUBLISHED: 2018-08-14
A security vulnerability was identified in 3PAR Service Processor (SP) prior to SP-4.4.0.GA-110(MU7). The vulnerability may be locally exploited to allow directory traversal.
CVE-2018-7099
PUBLISHED: 2018-08-14
A security vulnerability was identified in 3PAR Service Processor (SP) prior to SP-4.4.0.GA-110(MU7). The vulnerability may be locally exploited to allow disclosure of privileged information.
CVE-2018-7100
PUBLISHED: 2018-08-14
A potential security vulnerability has been identified in HPE OfficeConnect 1810 Switch Series (HP 1810-24G - P.2.22 and previous versions, HP 1810-48G PK.1.34 and previous versions, HP 1810-8 v2 P.2.22 and previous versions). The vulnerability could allow local disclosure of sensitive information.
CVE-2018-7077
PUBLISHED: 2018-08-14
A security vulnerability in HPE XP P9000 Command View Advanced Edition (CVAE) Device Manager (DevMgr 8.5.0-00 and prior to 8.6.0-00), Configuration Manager (CM 8.5.0-00 and prior to 8.6.0-00) could be exploited to allow local and remote unauthorized access to sensitive information.