• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
fbi urges olympic athletes to leave personal devices at home

FBI urges Olympic athletes to leave personal devices at home due to cyber risk

You are here: Home / General Cyber Security News / FBI urges Olympic athletes to leave personal devices at home due to cyber risk
February 1, 2022

Shutterstock

The FBI has urged all athletes to retain their personalized smartphones at property and as a substitute use a short-term phone though at the Olympic Game titles.

The organisation revealed a detect in which it warns entities linked with the February 2022 Beijing Winter season Olympics and March 2022 Paralympics that cyber actors could use a broad array of cyber things to do, which includes DDoS or ransomware attacks, to disrupt the activities.

✔ Approved Seller From Our Partners
Malwarebytes Premium 2022

Protect yourself against all threads using Malwarebytes. Get Malwarebytes Premium with 60% discount from a Malwarebytes official seller SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Furthermore, the FBI warned Olympic contributors and travellers of opportunity threats involved with mobile purposes designed by untrusted suppliers.

“The down load and use of apps, which include individuals necessary to participate or remain in the country, could enhance the option for cyber actors to steal own details or set up tracking equipment, destructive code, or malware,” stated the FBI.

The organisation suggests all athletes to use a non permanent phone, highlighting that the National Olympic Committees in some Western nations are also advising athletes to depart individual products at household due to cyber security concerns at the Game titles. 

However, it included that it is not aware of any precise cyber menace against the Olympics, but encourages companions to remain vigilant and keep finest procedures in their network and electronic environments.

It pointed to the 2020 Tokyo Olympics and Paralympics, the place there were being around 450 million tried cyber-associated incidents all through the occasion, despite the fact that none have been successful thanks to the cyber security actions in put, according to the NTT Corporation which was in cost of IT security. The most preferred attack solutions utilised were being malware, email spoofing, phishing, and the use of fake sites and streaming products and services developed to search like formal Olympic company providers.

The FBI included that the use of new digital infrastructure and mobile programs, like electronic wallets or programs that keep track of COVID testing or vaccination status, could also enhance the option for cyber actors to inflict harm. This could allow for them to steal personal data or put in tracking equipment, destructive code, or malware. The FBI underlined that athletes will be essential to use the MY2022 smartphone application to track their health and journey info.

The MY2022 app was analysed by Citizen Lab researchers who mentioned they had identified it contained a “devastating” encryption flaw, which it claimed permitted users’ audio and file transfer encryption to be sidestepped. The scientists also claimed it fails to validate SSL certificates and can be deceived into connecting to a destructive host.

There also appears to have been some misinformation bordering the privacy of the Chinese app, with a person researcher, Jonathan Scott, declaring that athletes’ audio is currently being collected, analysed, and saved on servers belonging to a Chinese AI agency with human rights fears known as iFlytek. This assert has been shared by US senators and a well known podcaster on Twitter.

sigh. pic.twitter.com/epP7AotFuD

— Kevin Beaumont (@GossiTheDog) January 31, 2022

Even so, members of the infosec neighborhood have reported the researcher’s claim is unsubstantiated by any of the evidence delivered, even however it has now been shared widely.

I really do not typically tweet about stories until they are posted, but the misinfo @joshrogin is spouting is much too dangerous and I’m way too weary to file appropriate now. Promises that users’ audio is continuously gathered, analyzed & stored is 100% unsubstantiated by *any* of the proof presented. pic.twitter.com/ySl5tkBWIg

— Dan Goodin (@dangoodin001) January 28, 2022


Some sections of this post are sourced from:
www.itpro.co.uk

Previous Post: «Cyber Security News Data Leak Exposes IDs of Airport Security Workers
Next Post: QNAP ransomware victims dealt double blow as firmware update hampers decryption qnap ransomware victims dealt double blow as firmware update hampers»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Browser-in-the-Browser Attack Makes Phishing Nearly Invisible
  • Brower-in-the-Browser Attack Makes Phishing Nearly Invisible
  • Facestealer Trojan Hidden in Google Play Plunders Facebook Accounts
  • New Mexico Appoints Cybersecurity Advisor
  • Conti Ransomware V. 3, Including Decryptor, Leaked
  • FTC Accuses CafePress of Data Breach “Cover-Up”
  • Dental Care Data Breach May Impact 1 Million Texans
  • Bridgestone Hit as Ransomware Torches Toyota Supply Chain
  • New Browser-in-the Browser (BITB) Attack Makes Phishing Nearly Undetectable
  • Ransomware strikes Scottish mental health charity

Copyright © TheCyberSecurity.News, All Rights Reserved.