{"id":3046,"date":"2018-06-14T13:38:49","date_gmt":"2018-06-14T13:38:49","guid":{"rendered":"https:\/\/kasperskycontenthub.com\/threatpost\/?p=132830"},"modified":"2018-06-14T13:38:49","modified_gmt":"2018-06-14T13:38:49","slug":"u-s-intelligence-cautions-world-cup-travelers-on-mobile-use","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/u-s-intelligence-cautions-world-cup-travelers-on-mobile-use\/","title":{"rendered":"U.S. Intelligence Cautions World Cup Travelers on Mobile Use"},"content":{"rendered":"<div class=\"media_block\"><\/div>\n<p>The 2018 FIFA World Cup is kicking off in Russia today, with at least 1 million visitors <a href=\"http:\/\/welcome2018.com\/en\/journal\/materials\/moskva-ozhidaet-do-1-mln-bolelshchikov-v-dni-chm-2018\/\" target=\"_blank\" rel=\"noopener\">expected<\/a> to travel to Moscow alone to take in the world\u2019s biggest sporting event in person.<\/p>\n<p>But the event will feature more than just breathtaking goals and soccer superstars: According to researchers and at least one U.S. counter-intelligence head, travelers could face a bevy of cyber-dangers while in-country.<\/p>\n<p>In a <a href=\"https:\/\/www.reuters.com\/article\/us-usa-russia-hackers-exclusive\/exclusive-us-counterspy-warns-world-cup-travelers-devices-could-be-hacked-idUSKBN1J82YX\" target=\"_blank\" rel=\"noopener\">statement<\/a> to Reuters on Tuesday, William Evanina, an FBI agent and the director of the US National Counterintelligence and Security Center, warned that World Cup travelers had best leave their phones and other gadgets at home to avoid cyber-compromise.<\/p>\n<p>\u201cIf you\u2019re planning on taking a mobile phone, laptop, PDA, or other electronic device with you \u2013 make no mistake \u2013 any data on those devices (especially your personally identifiable information) may be accessed by the <a href=\"https:\/\/www.us-cert.gov\/ncas\/tips\/ST14-001\" target=\"_blank\" rel=\"noopener\">Russian government<\/a> or cybercriminals,\u201d he said.<\/p>\n<p>He added, \u201cCorporate and government officials are most at risk, but don\u2019t assume you\u2019re too insignificant to be targeted. If you can do without the device, don\u2019t take it. If you must take one, take a different device from your usual one and remove the battery when not in use.\u201d<\/p>\n<p>The U.S. government has issued <a href=\"https:\/\/www.nytimes.com\/2018\/02\/08\/technology\/winter-olympics-hackers.html\" target=\"_blank\" rel=\"noopener\">similar warnings<\/a> for other major sporting events, including this year\u2019s Winter Olympics in South Korea; cybercriminals after all have a knack for being where the people are and are generally poised to take advantage of the situation. But researchers said that it will pay to be extra-vigilant when traveling to the World Cup, thanks to Russia\u2019s prodigious underground cybercrime scene.<\/p>\n<p>\u201cRussia is an unsecure location and travelers need to consider themselves compromised the moment they step off the airplane,\u201d said Sinan Eren, CEO of Fyde Security, in an interview with Threatpost. \u201cEveryone should consider themselves a high-value target for potential cyber-scammers. The fact that you come from the United States, a wealthy country compared to Russia, means that you are a potentially a meaningful return on investment for Russian cybercriminals.\u201d<\/p>\n<p><strong>A Hat Trick of Concerns for Mobile Devices<\/strong><\/p>\n<p>When it comes to Evanina\u2019s warning, Eren added that bad actors are looking to exploit three points of possible compromise when it comes to the mobile devices of travelers: physical, Wi-Fi and local carrier networks.<\/p>\n<p>\u201cThe first is often referred to as an \u2018Evil Maid\u2019 attack,\u201d he told Threatpost. \u201cThis is when, while going through airport security, or perhaps leaving your laptop in a hotel room, criminals get physical access to your device and gain access to your information.\u201d<\/p>\n<p><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/31\/2018\/06\/14091153\/World-Cup-Russia-Soccer-Stadium.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-132832 alignleft\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/31\/2018\/06\/14091153\/World-Cup-Russia-Soccer-Stadium-300x151.png\" alt=\"\" width=\"300\" height=\"151\"\/><\/a>More prevalent threats however exist on the Wi-Fi front. Criminals can carry out man-in-the-middle (MiTM) attacks or can set up an official-looking or innocuous-sounding SSID (i.e., \u201cHotel Wi-Fi\u201d) to trick users into connecting to it \u2013 and from there intercept traffic or convince victims to share credentials.<\/p>\n<p>Gary McCloud, vice president of business development at OpenVPN, told us that cybercriminals especially look to compromise hotel Wi-Fi users.<\/p>\n<p>\u201cOne of the most obvious threats is related to cybersecurity at hotels,\u201d he told Threatpost. \u201cMost have inherently insecure Wi-Fi because, when these networks were deployed, preventing hacker organizations and criminal access was not in the primary design. Hotels may be running outdated firmware, vulnerable code or have weak administrator passwords, and this increases the risk of a security breach. Hackers typically intercept email, social accounts, bank accounts, etc.\u201d<\/p>\n<p>The third possible point of compromise when it comes to mobile devices comes via local mobile carriers.<\/p>\n<p>\u201cTo put it in the most basic terms, when traveling to a foreign country, you are using the local network\u2019s \u2018plumbing,&#8217;\u201d said Eren. \u201cCountries with strong autocratic regimes in place may have influence or control over cellular service providers and use that access to intercept information or inject a malicious payload.\u201d<\/p>\n<p>All of these compromises can give rise to follow-on attacks as well. \u201cA person checks their credit-card balance online, a criminal sees that web traffic and sends a fake notification from that bank after their session ends,\u201d Eren noted. \u201cTo the unsuspecting traveler this would seem perfectly normal.\u201d<\/p>\n<p>Other <a href=\"https:\/\/threatpost.com\/world-cup-vacation-scams-lead-in-phishing-trips-this-summer\/132543\/\" target=\"_blank\" rel=\"noopener\">phishing scams<\/a> can redirect users to a phony web page where they inadvertently download virus-laden malware.<\/p>\n<p>IBM also cautioned against the \u201cstranded traveler\u201d scam.<\/p>\n<p>\u201cFans \u2014 and their family and friends back home \u2014 can also fall victim to [this],\u201d the firm said in a recent fraud alert <a href=\"https:\/\/securityintelligence.com\/cybersecurity-at-the-world-cup-what-you-should-know\/\" target=\"_blank\" rel=\"noopener\">posting<\/a>. \u201cIn this attack, malicious actors hijack the email account of someone traveling overseas. With this privileged access, they can send targeted messages to friends and family members, claiming to be the traveler in desperate need of funds quickly.\u201d<\/p>\n<p><strong>Kicking Off Mitigation<\/strong><\/p>\n<p>Using a burner phone might be the best idea when it comes to protection, researchers said.<\/p>\n<p>\u201cReformatting or re-imaging a device will not protect you from compromises to your device component firmware,\u201d Eren said. \u201cI highly recommend\u2026buying a local phone from a kiosk when they arrive and toss it in the trash before preparing for take-off.\u201d<\/p>\n<p>Travelers could also make use of a VPN that encrypts their data from the device and conceals their device IP.<\/p>\n<p>\u201cIf you are going to Russia, use a VPN to connect to the internet,\u201d Kaspersky Lab said in a <a href=\"https:\/\/www.kaspersky.com\/blog\/fifa-2018-security\/22526\/\" target=\"_blank\" rel=\"noopener\">recent posting<\/a> on avoiding World Cup-related scams. \u201cIn the aftermath of the government\u2019s attempt to block Telegram, many popular sites in Russia are either unavailable or unstable. To avoid the agony of not being able to post a selfie of your grinning face against the backdrop of your team\u2019s goal celebration, get connected to a VPN in advance.\u201d<\/p>\n<p>However, it\u2019s worth noting that <a href=\"https:\/\/themoscowtimes.com\/news\/russian-law-banning-anonymous-online-surfing-comes-into-effect-59434\" target=\"_blank\" rel=\"noopener\">Russia\u2019s new law<\/a>, effective November 1, 2017, regulates the use of technology that would allow someone to search the internet anonymously.<\/p>\n<p>\u201cAlthough the law does not directly ban VPNs or anonymizers, it does restrict access to banned websites that would be accessible with a VPN,\u201d explained McCloud.<\/p>\n<p><em>Images courtesy of FIFA.<\/em><\/p>\n<p>READ MORE <a href=\"https:\/\/threatpost.com\/u-s-intelligence-cautions-world-cup-travelers-on-mobile-use\/132830\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>World Cup travelers should leave their mobile phones, laptops and tablets behind. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":3047,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[3],"tags":[1320,550,214,18,1321,1322,896,1323,1324,1325,19,1326,1327],"class_list":["post-3046","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threatpost","tag-cyber-attacks","tag-cybercrime","tag-fbi","tag-hacks","tag-mobile-devices","tag-network-compromise","tag-russia","tag-scams","tag-us-intelligence-warning","tag-vpn","tag-vulnerabilities","tag-william-evanina","tag-world-cup"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>U.S. Intelligence Cautions World Cup Travelers on Mobile Use 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/u-s-intelligence-cautions-world-cup-travelers-on-mobile-use\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"U.S. Intelligence Cautions World Cup Travelers on Mobile Use 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/u-s-intelligence-cautions-world-cup-travelers-on-mobile-use\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-06-14T13:38:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/u-s-intelligence-cautions-world-cup-travelers-on-mobile-use.png\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"151\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/u-s-intelligence-cautions-world-cup-travelers-on-mobile-use\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/u-s-intelligence-cautions-world-cup-travelers-on-mobile-use\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"U.S. Intelligence Cautions World Cup Travelers on Mobile Use\",\"datePublished\":\"2018-06-14T13:38:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/u-s-intelligence-cautions-world-cup-travelers-on-mobile-use\/\"},\"wordCount\":993,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/u-s-intelligence-cautions-world-cup-travelers-on-mobile-use\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/u-s-intelligence-cautions-world-cup-travelers-on-mobile-use.png\",\"keywords\":[\"cyber attacks\",\"Cybercrime\",\"FBI\",\"Hacks\",\"mobile devices\",\"network compromise\",\"russia\",\"Scams\",\"us intelligence warning\",\"VPN\",\"Vulnerabilities\",\"william evanina\",\"World Cup\"],\"articleSection\":[\"Threatpost\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/u-s-intelligence-cautions-world-cup-travelers-on-mobile-use\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/u-s-intelligence-cautions-world-cup-travelers-on-mobile-use\/\",\"name\":\"U.S. Intelligence Cautions World Cup Travelers on Mobile Use 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/u-s-intelligence-cautions-world-cup-travelers-on-mobile-use\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/u-s-intelligence-cautions-world-cup-travelers-on-mobile-use\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/u-s-intelligence-cautions-world-cup-travelers-on-mobile-use.png\",\"datePublished\":\"2018-06-14T13:38:49+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/u-s-intelligence-cautions-world-cup-travelers-on-mobile-use\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/u-s-intelligence-cautions-world-cup-travelers-on-mobile-use\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/u-s-intelligence-cautions-world-cup-travelers-on-mobile-use\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/u-s-intelligence-cautions-world-cup-travelers-on-mobile-use.png\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/u-s-intelligence-cautions-world-cup-travelers-on-mobile-use.png\",\"width\":300,\"height\":151},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/u-s-intelligence-cautions-world-cup-travelers-on-mobile-use\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"cyber attacks\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/cyber-attacks\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"U.S. Intelligence Cautions World Cup Travelers on Mobile Use\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"U.S. Intelligence Cautions World Cup Travelers on Mobile Use 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/u-s-intelligence-cautions-world-cup-travelers-on-mobile-use\/","og_locale":"en_US","og_type":"article","og_title":"U.S. Intelligence Cautions World Cup Travelers on Mobile Use 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/u-s-intelligence-cautions-world-cup-travelers-on-mobile-use\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-06-14T13:38:49+00:00","og_image":[{"width":300,"height":151,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/u-s-intelligence-cautions-world-cup-travelers-on-mobile-use.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/u-s-intelligence-cautions-world-cup-travelers-on-mobile-use\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/u-s-intelligence-cautions-world-cup-travelers-on-mobile-use\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"U.S. Intelligence Cautions World Cup Travelers on Mobile Use","datePublished":"2018-06-14T13:38:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/u-s-intelligence-cautions-world-cup-travelers-on-mobile-use\/"},"wordCount":993,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/u-s-intelligence-cautions-world-cup-travelers-on-mobile-use\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/u-s-intelligence-cautions-world-cup-travelers-on-mobile-use.png","keywords":["cyber attacks","Cybercrime","FBI","Hacks","mobile devices","network compromise","russia","Scams","us intelligence warning","VPN","Vulnerabilities","william evanina","World Cup"],"articleSection":["Threatpost"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/u-s-intelligence-cautions-world-cup-travelers-on-mobile-use\/","url":"https:\/\/www.threatshub.org\/blog\/u-s-intelligence-cautions-world-cup-travelers-on-mobile-use\/","name":"U.S. Intelligence Cautions World Cup Travelers on Mobile Use 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/u-s-intelligence-cautions-world-cup-travelers-on-mobile-use\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/u-s-intelligence-cautions-world-cup-travelers-on-mobile-use\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/u-s-intelligence-cautions-world-cup-travelers-on-mobile-use.png","datePublished":"2018-06-14T13:38:49+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/u-s-intelligence-cautions-world-cup-travelers-on-mobile-use\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/u-s-intelligence-cautions-world-cup-travelers-on-mobile-use\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/u-s-intelligence-cautions-world-cup-travelers-on-mobile-use\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/u-s-intelligence-cautions-world-cup-travelers-on-mobile-use.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/u-s-intelligence-cautions-world-cup-travelers-on-mobile-use.png","width":300,"height":151},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/u-s-intelligence-cautions-world-cup-travelers-on-mobile-use\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"cyber attacks","item":"https:\/\/www.threatshub.org\/blog\/tag\/cyber-attacks\/"},{"@type":"ListItem","position":3,"name":"U.S. Intelligence Cautions World Cup Travelers on Mobile Use"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/3046","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=3046"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/3046\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/3047"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=3046"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=3046"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=3046"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}