SlideShare a Scribd company logo
1 of 19
Download to read offline
SECURITY AND PRIVACY
AT THE OLYMPICS
By Lookout, Inc.



Heading to Russia for the Olympics?
Keep in mind that taking your phone in
public puts your privacy at risk.
So you’re saying I should

go live under a rock?

NO



You can enjoy the games without putting
your personal information at risk with
a little common sense, caution and these tips.

Stay native
Russia is a "hot zone" for mobile threats, where users had a 75%
likelihood of encountering a mobile threat in 2013. This is largely
thanks to unregulated 3rd party app stores and the availability of low
risk monetization paths like premium rate SMS fraud. But traveling to
the Olympics doesn't necessarily put your phone in jeopardy. 



Tip: Make sure your device settings reflect
your native or regular IP address. The Google
Play Store should be available to your device
as normal in Russia, so keep using the store as
it will be subject to Google's usual scrutiny. 


Don’t download on the fly
Every Olympics season since the dawn of mobile malware,
we've seen scammy apps that try to lure in the unsuspecting.
Knowing that the risk of encountering malware via any 3rd
party stores or side-load downloaded apps is 20 times higher
in Russia than back in the US, you should exercise caution
before downloading any "Olympic" app that comes your way. 



Tip: Use trusted app stores and Google Play when
downloading apps. Review all apps you download and
consult the official "Olympic app list" before clicking.
Make sure the Android system setting 'Unknown
sources' is unchecked to prevent dropped or drive-bydownload app installs. 
Avoid using public Wi-Fi
Your phone’s 3G or 4G data connection is probably more
secure than the Wi-Fi networks that thousands of people
are using. Stick to a secure connection, especially if you’ll
be logging into accounts, making purchases or entering
any private information about yourself.



Tip: Turn off Wi-Fi connectivity in your
phone’s settings unless you’re confident in
network security.
$
Watch your mobile wallet
 You'll find Near Field Communication (NFC) mobile
payment stations around the Russian Olympics for your
consumer convenience, but be cautious. 



Tip: Turn on NFC signals only when necessary and
download Lookout Mobile Security to protect your
mobile privacy and security, so your phone or credit
card information doesn’t fall into the wrong hands.


Keep your eyes on your phone
From installing malware to taking the device itself, you
never know what might happen to your phone when
you’re not watching it closely.



Tip: Don’t leave your device unattended.


Watch out for phishing
Phishing scams use email, text messages, Facebook, and
Twitter to send you links to websites that are designed to trick
you into providing information like passwords or account
numbers. These messages and sites are often very difficult to
distinguish from those of your bank or other legitimate sources.



Tip: Do not click on links or open
attachments in email messages unless you
can verify who sent them and what they sent.


Be able to find your
smartphone if it’s lost or stolen.
You’re using your mobile phone for so much this
Olympics — including maps to get around, as a credit card
via NFC, news feed and social communications. It would
be a big problem if your phone is lost or stolen. 



Tip: Install the Lookout app as a layer of
insurance for phone loss. You’ll be able to
locate your lost phone and even lock and wipe
it if you want to protect your sensitive data.
For more mobile security tips, follow

More Related Content

What's hot

Phishing scams in banking ppt
Phishing scams in banking pptPhishing scams in banking ppt
Phishing scams in banking pptKrishma Sandesra
 
20 Tips on Data Protection for Personal, Financial, Mobile And Network Security
20 Tips on Data Protection for Personal, Financial, Mobile And Network Security20 Tips on Data Protection for Personal, Financial, Mobile And Network Security
20 Tips on Data Protection for Personal, Financial, Mobile And Network SecurityPatten John
 
Junior secondary yr 7:8 aug 18 4.3 preview
Junior secondary yr 7:8 aug 18 4.3 previewJunior secondary yr 7:8 aug 18 4.3 preview
Junior secondary yr 7:8 aug 18 4.3 previewLeonie Smith
 
What is a phishing attack
What is a phishing attackWhat is a phishing attack
What is a phishing attackAariyaRathi
 
Computer crimes(1)
Computer crimes(1)Computer crimes(1)
Computer crimes(1)marie120206
 
Protect your Oneplus from Viruses Around the Web
Protect your Oneplus from Viruses Around the WebProtect your Oneplus from Viruses Around the Web
Protect your Oneplus from Viruses Around the WebWireless Solutions NY
 
Protect your data while travelling
Protect your data while travellingProtect your data while travelling
Protect your data while travellingUMS Conferences
 
Cyber Security (Hacking)
Cyber Security (Hacking)Cyber Security (Hacking)
Cyber Security (Hacking)Dhrumit Patel
 
Phishing Attack Awareness and Prevention
Phishing Attack Awareness and PreventionPhishing Attack Awareness and Prevention
Phishing Attack Awareness and Preventionsonalikharade3
 
Cybersafety Checklist for Writers
Cybersafety Checklist for WritersCybersafety Checklist for Writers
Cybersafety Checklist for WritersShennandoah Diaz
 

What's hot (18)

Cybersecurity tips
Cybersecurity tipsCybersecurity tips
Cybersecurity tips
 
Computer SOS
Computer SOSComputer SOS
Computer SOS
 
Phishing scams in banking ppt
Phishing scams in banking pptPhishing scams in banking ppt
Phishing scams in banking ppt
 
Internet fraud and identity theft
Internet fraud and identity theftInternet fraud and identity theft
Internet fraud and identity theft
 
20 Tips on Data Protection for Personal, Financial, Mobile And Network Security
20 Tips on Data Protection for Personal, Financial, Mobile And Network Security20 Tips on Data Protection for Personal, Financial, Mobile And Network Security
20 Tips on Data Protection for Personal, Financial, Mobile And Network Security
 
Phishing attack
Phishing attackPhishing attack
Phishing attack
 
Phishing 1 vp
Phishing 1 vpPhishing 1 vp
Phishing 1 vp
 
Junior secondary yr 7:8 aug 18 4.3 preview
Junior secondary yr 7:8 aug 18 4.3 previewJunior secondary yr 7:8 aug 18 4.3 preview
Junior secondary yr 7:8 aug 18 4.3 preview
 
Seminar
SeminarSeminar
Seminar
 
Phishing
PhishingPhishing
Phishing
 
What is a phishing attack
What is a phishing attackWhat is a phishing attack
What is a phishing attack
 
Computer crimes(1)
Computer crimes(1)Computer crimes(1)
Computer crimes(1)
 
Protect your Oneplus from Viruses Around the Web
Protect your Oneplus from Viruses Around the WebProtect your Oneplus from Viruses Around the Web
Protect your Oneplus from Viruses Around the Web
 
Protect your data while travelling
Protect your data while travellingProtect your data while travelling
Protect your data while travelling
 
Cyber Security (Hacking)
Cyber Security (Hacking)Cyber Security (Hacking)
Cyber Security (Hacking)
 
Phishing Attack Awareness and Prevention
Phishing Attack Awareness and PreventionPhishing Attack Awareness and Prevention
Phishing Attack Awareness and Prevention
 
Information security
Information securityInformation security
Information security
 
Cybersafety Checklist for Writers
Cybersafety Checklist for WritersCybersafety Checklist for Writers
Cybersafety Checklist for Writers
 

Viewers also liked

Viewers also liked (11)

Olympics presentation 2012
Olympics presentation 2012Olympics presentation 2012
Olympics presentation 2012
 
BBC Olympics: An Accessibility Study
BBC Olympics: An Accessibility StudyBBC Olympics: An Accessibility Study
BBC Olympics: An Accessibility Study
 
A Brief History Of The Olympics
A Brief History Of The OlympicsA Brief History Of The Olympics
A Brief History Of The Olympics
 
Welcome to the Tokyo 2020 Olympics English Task Force Group
Welcome to the Tokyo 2020 Olympics English Task Force GroupWelcome to the Tokyo 2020 Olympics English Task Force Group
Welcome to the Tokyo 2020 Olympics English Task Force Group
 
India olympics 2012
India   olympics 2012India   olympics 2012
India olympics 2012
 
London olympics 2012
London olympics 2012London olympics 2012
London olympics 2012
 
Olympics
OlympicsOlympics
Olympics
 
Teaching the Olympics
Teaching the OlympicsTeaching the Olympics
Teaching the Olympics
 
Olympics 2012_ The details
Olympics 2012_ The detailsOlympics 2012_ The details
Olympics 2012_ The details
 
Olympics.ppt.
Olympics.ppt.Olympics.ppt.
Olympics.ppt.
 
Train The Trainer Power Point Presentation
Train The Trainer   Power Point PresentationTrain The Trainer   Power Point Presentation
Train The Trainer Power Point Presentation
 

Similar to Security & Privacy at the Olympics

Mobile Security at the World Cup
Mobile Security at the World CupMobile Security at the World Cup
Mobile Security at the World CupLookout
 
Cyber crime awareness
Cyber crime awarenessCyber crime awareness
Cyber crime awarenessArjun Chetry
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]sheenau
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2NetLockSmith
 
Cybersecurity Awareness Month Tips
Cybersecurity Awareness Month TipsCybersecurity Awareness Month Tips
Cybersecurity Awareness Month TipsKevin Fream
 
10 most important cyber security tips for your users
10 most important cyber security tips for your users10 most important cyber security tips for your users
10 most important cyber security tips for your usersSimpliv LLC
 
31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month OcotoberQuick Heal Technologies Ltd.
 
How to Keep Your Phone Safe from Hackers (1).pptx
How to Keep Your Phone Safe from Hackers (1).pptxHow to Keep Your Phone Safe from Hackers (1).pptx
How to Keep Your Phone Safe from Hackers (1).pptx4Freedom Mobile
 
Cyber Safety | Cyber Safety Tips | Cybersecurity
Cyber Safety | Cyber Safety Tips | CybersecurityCyber Safety | Cyber Safety Tips | Cybersecurity
Cyber Safety | Cyber Safety Tips | CybersecurityCyberambessador
 
Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internetmohmd-kutbi
 

Similar to Security & Privacy at the Olympics (20)

Mobile Security at the World Cup
Mobile Security at the World CupMobile Security at the World Cup
Mobile Security at the World Cup
 
Sim swapping
Sim swappingSim swapping
Sim swapping
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Security Tips
Security TipsSecurity Tips
Security Tips
 
Cyber crime awareness
Cyber crime awarenessCyber crime awareness
Cyber crime awareness
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
 
Cybersecurity Awareness Month Tips
Cybersecurity Awareness Month TipsCybersecurity Awareness Month Tips
Cybersecurity Awareness Month Tips
 
10 most important cyber security tips for your users
10 most important cyber security tips for your users10 most important cyber security tips for your users
10 most important cyber security tips for your users
 
31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober
 
How to Keep Your Phone Safe from Hackers (1).pptx
How to Keep Your Phone Safe from Hackers (1).pptxHow to Keep Your Phone Safe from Hackers (1).pptx
How to Keep Your Phone Safe from Hackers (1).pptx
 
Presentation for class
Presentation for classPresentation for class
Presentation for class
 
AMMU
AMMUAMMU
AMMU
 
Cyber Safety | Cyber Safety Tips | Cybersecurity
Cyber Safety | Cyber Safety Tips | CybersecurityCyber Safety | Cyber Safety Tips | Cybersecurity
Cyber Safety | Cyber Safety Tips | Cybersecurity
 
Smartphone apps
Smartphone appsSmartphone apps
Smartphone apps
 
Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internet
 
Canadian Consumer Handbook
Canadian Consumer HandbookCanadian Consumer Handbook
Canadian Consumer Handbook
 
Smartphone Smart Card 061013
Smartphone Smart Card 061013Smartphone Smart Card 061013
Smartphone Smart Card 061013
 
Mobile phone security
Mobile phone securityMobile phone security
Mobile phone security
 
Traveling Safely with Smartphones 061614
Traveling Safely with Smartphones 061614Traveling Safely with Smartphones 061614
Traveling Safely with Smartphones 061614
 

More from Lookout

The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected CarsThe New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected CarsLookout
 
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity PredictionsLooking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity PredictionsLookout
 
5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile SecurityLookout
 
Feds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or notFeds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or notLookout
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?Lookout
 
Mobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingMobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingLookout
 
2015 Cybersecurity Predictions
2015 Cybersecurity Predictions2015 Cybersecurity Predictions
2015 Cybersecurity PredictionsLookout
 
The New NotCompatible
The New NotCompatibleThe New NotCompatible
The New NotCompatibleLookout
 
Relentless Mobile Threats to Avoid
Relentless Mobile Threats to AvoidRelentless Mobile Threats to Avoid
Relentless Mobile Threats to AvoidLookout
 
When Android Apps Go Evil
When Android Apps Go EvilWhen Android Apps Go Evil
When Android Apps Go EvilLookout
 
Scaling Mobile Development
Scaling Mobile DevelopmentScaling Mobile Development
Scaling Mobile DevelopmentLookout
 
Visualizing Privacy
Visualizing PrivacyVisualizing Privacy
Visualizing PrivacyLookout
 
Hiring Hackers
Hiring HackersHiring Hackers
Hiring HackersLookout
 
How to (Safely) Cut the Cord With Your Old iPhone
How to (Safely) Cut the Cord With Your Old iPhoneHow to (Safely) Cut the Cord With Your Old iPhone
How to (Safely) Cut the Cord With Your Old iPhoneLookout
 
3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google AccountLookout
 
3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple Account3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple AccountLookout
 
The Back to School Smartphone Guide
The Back to School Smartphone GuideThe Back to School Smartphone Guide
The Back to School Smartphone GuideLookout
 
Spring Cleaning for Your Smartphone
Spring Cleaning for Your SmartphoneSpring Cleaning for Your Smartphone
Spring Cleaning for Your SmartphoneLookout
 
Mobile Threats, Made to Measure
Mobile Threats, Made to MeasureMobile Threats, Made to Measure
Mobile Threats, Made to MeasureLookout
 
5 Types of Shady Apps
5 Types of Shady Apps5 Types of Shady Apps
5 Types of Shady AppsLookout
 

More from Lookout (20)

The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected CarsThe New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
 
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity PredictionsLooking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
 
5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security
 
Feds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or notFeds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or not
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?
 
Mobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingMobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are Asking
 
2015 Cybersecurity Predictions
2015 Cybersecurity Predictions2015 Cybersecurity Predictions
2015 Cybersecurity Predictions
 
The New NotCompatible
The New NotCompatibleThe New NotCompatible
The New NotCompatible
 
Relentless Mobile Threats to Avoid
Relentless Mobile Threats to AvoidRelentless Mobile Threats to Avoid
Relentless Mobile Threats to Avoid
 
When Android Apps Go Evil
When Android Apps Go EvilWhen Android Apps Go Evil
When Android Apps Go Evil
 
Scaling Mobile Development
Scaling Mobile DevelopmentScaling Mobile Development
Scaling Mobile Development
 
Visualizing Privacy
Visualizing PrivacyVisualizing Privacy
Visualizing Privacy
 
Hiring Hackers
Hiring HackersHiring Hackers
Hiring Hackers
 
How to (Safely) Cut the Cord With Your Old iPhone
How to (Safely) Cut the Cord With Your Old iPhoneHow to (Safely) Cut the Cord With Your Old iPhone
How to (Safely) Cut the Cord With Your Old iPhone
 
3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account
 
3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple Account3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple Account
 
The Back to School Smartphone Guide
The Back to School Smartphone GuideThe Back to School Smartphone Guide
The Back to School Smartphone Guide
 
Spring Cleaning for Your Smartphone
Spring Cleaning for Your SmartphoneSpring Cleaning for Your Smartphone
Spring Cleaning for Your Smartphone
 
Mobile Threats, Made to Measure
Mobile Threats, Made to MeasureMobile Threats, Made to Measure
Mobile Threats, Made to Measure
 
5 Types of Shady Apps
5 Types of Shady Apps5 Types of Shady Apps
5 Types of Shady Apps
 

Recently uploaded

A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

Recently uploaded (20)

A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

Security & Privacy at the Olympics

  • 1. SECURITY AND PRIVACY AT THE OLYMPICS By Lookout, Inc.
  • 2.   Heading to Russia for the Olympics? Keep in mind that taking your phone in public puts your privacy at risk.
  • 3. So you’re saying I should go live under a rock? NO
  • 4.   You can enjoy the games without putting your personal information at risk with a little common sense, caution and these tips.
  • 5.  Stay native Russia is a "hot zone" for mobile threats, where users had a 75% likelihood of encountering a mobile threat in 2013. This is largely thanks to unregulated 3rd party app stores and the availability of low risk monetization paths like premium rate SMS fraud. But traveling to the Olympics doesn't necessarily put your phone in jeopardy. 
  • 6.   Tip: Make sure your device settings reflect your native or regular IP address. The Google Play Store should be available to your device as normal in Russia, so keep using the store as it will be subject to Google's usual scrutiny. 
  • 7.  Don’t download on the fly Every Olympics season since the dawn of mobile malware, we've seen scammy apps that try to lure in the unsuspecting. Knowing that the risk of encountering malware via any 3rd party stores or side-load downloaded apps is 20 times higher in Russia than back in the US, you should exercise caution before downloading any "Olympic" app that comes your way. 
  • 8.   Tip: Use trusted app stores and Google Play when downloading apps. Review all apps you download and consult the official "Olympic app list" before clicking. Make sure the Android system setting 'Unknown sources' is unchecked to prevent dropped or drive-bydownload app installs. 
  • 9. Avoid using public Wi-Fi Your phone’s 3G or 4G data connection is probably more secure than the Wi-Fi networks that thousands of people are using. Stick to a secure connection, especially if you’ll be logging into accounts, making purchases or entering any private information about yourself.
  • 10.   Tip: Turn off Wi-Fi connectivity in your phone’s settings unless you’re confident in network security.
  • 11. $ Watch your mobile wallet  You'll find Near Field Communication (NFC) mobile payment stations around the Russian Olympics for your consumer convenience, but be cautious. 
  • 12.   Tip: Turn on NFC signals only when necessary and download Lookout Mobile Security to protect your mobile privacy and security, so your phone or credit card information doesn’t fall into the wrong hands.
  • 13.  Keep your eyes on your phone From installing malware to taking the device itself, you never know what might happen to your phone when you’re not watching it closely.
  • 14.   Tip: Don’t leave your device unattended.
  • 15.  Watch out for phishing Phishing scams use email, text messages, Facebook, and Twitter to send you links to websites that are designed to trick you into providing information like passwords or account numbers. These messages and sites are often very difficult to distinguish from those of your bank or other legitimate sources.
  • 16.   Tip: Do not click on links or open attachments in email messages unless you can verify who sent them and what they sent.
  • 17.  Be able to find your smartphone if it’s lost or stolen. You’re using your mobile phone for so much this Olympics — including maps to get around, as a credit card via NFC, news feed and social communications. It would be a big problem if your phone is lost or stolen. 
  • 18.   Tip: Install the Lookout app as a layer of insurance for phone loss. You’ll be able to locate your lost phone and even lock and wipe it if you want to protect your sensitive data.
  • 19. For more mobile security tips, follow