Connect with us

Hi, what are you looking for?

Economy

Be careful when scanning QR codes, as they have become one of the new favorite tools of scammers

Be careful when scanning QR codes, as they have become one of the new favorite tools of scammers

The US Federal Trade Commission has issued a warning about the dangers of QR codes. The codes appearing in more and more places, usually containing Internet links, have been used by criminals in tens of thousands of cyberattacks.

The square-arranged QR codes, most of which are black and white, are called “QR,” which stands for quick response, and work similarly to barcodes on store products. It is optically readable, can store numbers, letters, and binary codes, and is approximately three thousand bytes in size. This means approximately seven thousand numbers or four thousand characters, which is several times the capacity of traditional barcodes. Although this technology was developed in 1994, it has become really popular with the widespread spread of the Internet, as it can comfortably accommodate even a very long Internet address (URL), which would take much longer to type than to scan the code. Scanned using a camera. . However, if we consider that we are unable to pinpoint exactly which website this link is referring to, we can already guess how this technology has become one of the new favorite techniques of scammers.

the Read an article on the edge Reminds me: Cybersecurity company Trellix has encountered sixty thousand examples where one of these codes served as the entry point into an online scam. It’s no surprise that email scams are the most common, because we’re already used to spoofing messages that come via SMS and digging up our data, but what’s even more surprising is that scammers have also used payroll emails.

In Texas, you can also see QR codes on stickers affixed to parking meters meant to trick victims out of money.

Most cases are a standard phishing attack requesting bank or online access data, but now instead of simple links, perpetrators have tried links embedded in QR codes. Accordingly, as it is Federal Trade Commission warning He also emphasizes that we can protect ourselves in the same way: if we receive the code via email, we check the sender carefully; Be suspicious if the message contains bad Hungarian language, or if it is trying to bully us; If we open the specified page, we look for the lock that indicates authentication in our browser; And keep our phone and computer operating systems up to date with software updates. In addition, especially in the case of QR codes, it is important that the camera of Android and iPhone devices can read them without separate software, and that we do not download applications intended for this purpose, even dangerous ones. Make sure to scan the scanned link before opening it, though unfortunately many companies use link shortening services that can hide the true destination of both good and malicious messages.

See also  Index - Economy - French fuel can be used in the Pakse nuclear power plant

(Cover Photo: Brett Jordan/Unsplash)


What makes a strong password or PIN, why is Free Wi-Fi dangerous, and what is cyber hygiene?
Is our data really stolen if we use an open Wi-Fi network? What makes a strong password? Among other things, the latest episode of RE:FACT Podcast talks about such issues related to IT security, with Szilard Pfeiffer, IT security engineer, as a guest.


Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

You May Also Like

Top News

In a harrowing incident that has shaken the community of Lewiston, Maine, a series of shootings on Wednesday evening resulted in a tragic loss...

Top News

President Joe Biden’s abrupt departure from a speech on the U.S. economy at the White House on Monday sent a ripple of speculation and...

World

Chinese scientists have discovered a little-known type of ore containing a rare earth metal highly sought after for its superconducting properties. The ore, called...

Tech

A dangerous application appeared in the Apple App Store disguised as a known program. 24.hu reported the Based on TechCrunch article. Dangerous app in...

Copyright © 2024 Campus Lately.