top of page

Super Bowl Brings Scams and Cybersecurity Threats to Consumers

The Super Bowl, as one of the largest and most highly publicized sporting events in the world, can attract a range of cybersecurity and scam threats. Some of the common threats include:

  1. Phishing scams: Attackers often take advantage of the popularity of the event to send out phishing emails posing as official sources. These emails can contain links to malicious websites or attachments that, when opened, install malware on the recipient's device.

  2. Ticket scams: Fraudsters may set up fake ticket sales websites or sell counterfeit tickets to unsuspecting fans.

  3. Social engineering scams: Social media platforms may be used to spread false information or to trick users into downloading malicious software or handing over personal information.

  4. Wi-Fi security risks: Fans attending the event may connect to public Wi-Fi networks, which can be vulnerable to hacking and data theft.

Karen Worstell, Senior Cybersecurity Strategist, VMware

We heard from Karen Worstell, Senior Cybersecurity Strategist, VMware, on malicious actions we should expect from adversaries and how consumers can stay protected in the age of streaming apps and services:


“The Super Bowl has historically been a prime target for cybercriminals to launch cyberattacks affecting everything from event venues to critical infrastructure to online properties and email. Adversaries know that many people around the globe are tuning in through streaming apps and services, creating a greater attack vector and making it easier for them to strike. YOU are the prime target for this event. Be especially vigilant about clicking on sites and links that are linked to services associated with entertainment services you don’t normally use. Ensure that both company and personal computer firewall settings and advanced threat protection are in place and up-to-date since the greatest point of origin by far for cyber attacks during the Super Bowl will be end-point devices.” ###

Comments


bottom of page