Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityLogical SecurityArenas / Stadiums / Leagues / Entertainment

Attending the Olympics? Watch out for these mobile threats

By Krishna Vishnubhotla
Woman holding a cellphone

Image via Unsplash

July 2, 2024

The Olympics is the most highly attended, complex event in the world. Estimated to bring in over 15 million visitors this year, protecting the event from both physical and cyber-attacks is a massive undertaking involving thousands of trained professionals. During the London Olympics in 2012, more than 212 million cyberattacks were detected from the day of the opening ceremony, marked by multiple offenses such as a surge of distributed denial of service attacks on the electricity infrastructure. In the past few months of this year, more than 200 fraudulent sites selling tickets for sporting events have already been detected by French police. 

If you’re attending the Olympics or engaging with the event via a mobile application (such as the official Paris Olympics app), it’s important to know the risks facing your mobile device. Mobile devices are the prime attack vector cybercriminals have their eye on, since they are the hotspot for everything we do — from shopping, banking, entertainment, communication, work and even healthcare. Recently, the CISO for the Paris Olympics 2024 has announced that the number of attacks is expected to be eight times higher than it was for the Tokyo Olympics. So, what are those risks and how can you prepare? Let’s dive in.

Who is actually texting you?

There are many types of security threats facing an event as large as the Olympics. But when we zero in on the mobile device, there are a few threats most notorious for damage, the first being phishing. Phishing threats attempting to mimic “official” Olympic mobile applications will be on the rise. The goal of these attacks is to target attendees to gather sensitive information for further fraud or to trick attendees into downloading malware on their devices. The goal behind almost all cyberattacks is financial gain. With an audience that large, launching broad scams that target a wide swath of spectators is bound to reap some reward. If you’re attending or watching the games, keep your eye out for texts, emails or QR codes that aren’t from official Olympics updates or from people you know. As much as this may seem like common sense, this is one of the most successful avenues for cybercriminals when attempting to spread malware or steal sensitive data. QR codes have risen in popularity because of the ease it provides in sharing information simply with the scan of a camera. As a result, they will likely be seen everywhere in relation to the games, such as on TV screens, when downloading Olympic-related apps and in emails.

SMS-based phishing is also a specific type of phishing attack where attackers send links to mobile phones with the goal of having recipients click on the link or share personal information within a fraudulent site. For example, if you are looking to buy a ticket to the Olympics, double check you are on the official website before entering your information. Cybercriminals may pose as ticket vendors, sending a link to “buy” tickets but leading unsuspecting attendees to a fake website where payment info is then stolen. As mentioned earlier, email is still an avenue cybercriminals are expected to target during the games. For one, they may spam inboxes with junk mail in an attempt to create “email fatigue” in recipients, in which they will open a malicious email carelessly.

Ways you can steer clear of damage

From an attendee perspective, take the time to find the right mobile applications and ticket vendors rather than quickly and rashly following any link that prompts you to download or purchase. Beware of fake apps hiding in third-party app stores or opaque links that are promoted on social media apps like Instagram or TikTok. We expect there will be many fake and bogus mobile applications centered around the Olympics.

From an organizational perspective, employee awareness still is the farthest reaching and most successful way to protect against mobile attacks. Awareness training is a critical part of any comprehensive security strategy, and it involves communicating and practicing regular security training sessions and keeping an active watch on the latest threats. The sharing of intelligence, talent, technology and best practices is always valuable in regard to how organizations can protect themselves and their employees from attacks. The National Institutes of Standards and Technology (NIST) recently updated its Guidelines for Mobile Device Security (NIST SP 800-124r2) with a specific call for the need for Mobile Threat Defense (MTD) and Mobile App Vetting as part of a larger security strategy. The mobile device is the epicenter of today’s cybercriminal activity and thus should be prioritized as the epicenter of security strategies.

With the games being hosted in Paris this year, we’re already seeing attacks ramping up against the country. France has been the victim of a surge of cyberattacks in recent months. The French government announced recently it has been the victim of cyberattacks of “unprecedented intensity.” With the Olympics on the horizon, the government has launched a new agency aimed at combating online fraud and facilitating intelligence sharing between French and international law enforcement agencies — the French Anti-Cybercrime Office, or OFAC. Let this be a sober reminder that no attendee or spectator is beyond the reach of scams, fraud or cyberattacks. As you excitedly prepare to attend or virtually watch the Olympics, make sure you add cyber best practices to your list of things to do!

KEYWORDS: best practices mobile device security Olympic Games Olympics Security phishing risk intelligence social engineering

Share This Story

Krishna vishnubhotla headshot

Krishna Vishnubhotla is the Vice President Product Strategy at Zimperium. Image courtesy of Vishnubhotla 

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!