
In an ever changing and adapting world, quick response (QR) codes are being utilized as a dependable form of making payments, signing up for events, checking restaurant menus and more.
Often spotted on a printed medium to retrieve data in a digital medium, those tiny boxes filled with unique pixels help bridge the gap between the physical and digital world.
Though it may seem there aren’t many things that can’t be hacked these days, QR codes are one of those. Don’t get it twisted, the code itself cannot be hacked, but the endpoint can. Changing the final endpoint of a QR code is where cybercriminals can pounce upon an untrained eye who doesn’t notice any red flags.
REPURPOSING
The code cannot be changed after being printed, but it can be tampered with. Cybercriminals can repurpose an unused landing page to fit their malicious intent from an existing code that was previously used by a trusted source.
PASTING
Another method of fooling consumers, pasting a malicious code over a genuine one. This method is seen the most in public, high traffic places to attract the most eyes. This is where we as consumers must be careful to recognize the red flags before scanning.
AUTHENTICATION
Most smartphones have the technology to scan QR codes with their imbedded camera, along with displaying the code’s URL before being redirected to it. If there are any red flags, like misspelled words or out of order words, that link is most likely unsafe.
When scanning a code, especially in a public place, take time to review the poster and see if the offer looks legitimate. The same principle goes for spam emails or texts, but that should be a given.
FREE RESOURCES
SDN Communications has released our sixth series of posters to help businesses educate employees about relevant cybersecurity topics.
Our latest infographic on how to create a strong password in 2022 is below.
Use the form below the infographic to request a download of that poster and two others for your business.
