31 October 2014

Identity Theft Expert

Robert Siciliano - IDTheftSecurity.com

522 | posts 1,329,366 | views 59 | comments

QR Codes Could Deliver Malware

26 March 2012  |  1818 views  |  2

You’ve seen barcodes all your life. So you know what they look like: rectangles “boxes” comprised of a series of vertical lines. When a cashier scans a barcode, you hear a familiar beep and you are charged for that item.

A QR code looks different and offers more functionality. QR stands for “quick response.” Smartphones can download QR readers that use the phone’s built-in camera to read these codes. When the QR code reader application is open and the camera detects a QR code, the application beeps and asks you what you want to do next.

Today we see QR codes appearing in magazine advertisements and articles, on signs and billboards; anywhere a mobile marketer wants to allow information to be captured, whether in print or in public spaces, and facilitate digital interaction. Pretty much anyone can create a QR codes.

Unfortunately, that’s where the cybercriminals come in. While QR codes make it easy to connect with legitimate online properties, they also make it easy for hackers to distribute malware.

QR code infections are relatively new. A QR scam works because, as with a shortened URL, the link destination is obscured by the link itself. Once scanned, a QR code may link to an malicious website or download an unwanted application or mobile virus.

Here’s some ways to protect yourself from falling victim to malicious QR codes:

Be suspicious of QR codes that offer no context explaining them. Malicious codes often appear with little or no text.

If you arrive on a website via a QR code, never provide your personal or log in information since it could be a phishing attempt.

Use a QR reader that offers you a preview of the URL that you have scanned so that you can see if it looks suspicious before you go there.

Use complete mobile device security software, which includes anti-virus, anti-theft and web and app protection and can warn you of dangerous websites embedded in QR codes.

TagsSecurityRisk & regulation

Comments: (3)

Brett King - Moven - New York | 26 March, 2012, 14:48

So could this link. Doesn't mean all links or URLs are evil...

Be the first to give this comment the thumbs up 0 thumb ups! (Log in to thumb up)
Robert Siciliano - IDTheftSecurity.com - Boston | 26 March, 2012, 14:54

Correct, but most people dont look at a QR code as a link. So heads up. 

Be the first to give this comment the thumbs up 0 thumb ups! (Log in to thumb up)
Ketharaman Swaminathan - GTM360 Marketing Solutions - Pune | 27 March, 2012, 19:14

Agree with your suggestion #s 1, 2 and 4.

However, re. your suggestion #3, "Use a QR reader that offers you a preview of the URL that you have scanned so that you can see if it looks suspicious before you go there.", since it's customary to construct QR codes out of shortened URLs, I'm not sure how one can figure out if the URL looks suspicious or not. For example, a QR code for this blog post page (http://www.finextra.com/community/fullblog.aspx?blogid=6371) could be constructed out of its shortened version http://goo.gl/szlRT, which neither looks genuine nor suspicious.

Be the first to give this comment the thumbs up 0 thumb ups! (Log in to thumb up)
Comment on this story (membership required)
Log in to receive notifications when someone posts a comment

Latest posts from Robert

Steps to Manage a secure online backup

29 October 2014  |  490 views  |  0  |  Recommends 0 TagsSecurity

5 ways Criminals hack your PC

25 October 2014  |  1146 views  |  0  |  Recommends 0 TagsSecurity

2 Ways to Prevent Military Identity Theft

24 October 2014  |  606 views  |  0  |  Recommends 0 TagsSecurity

3 Stupid Simple Tips to protect your Identity

22 October 2014  |  771 views  |  0  |  Recommends 0 TagsSecurity

6 Ways to prevent Social Engineering Attacks

14 October 2014  |  640 views  |  0  |  Recommends 0 TagsSecurity
name

Robert Siciliano

job title

Security Analyst

company name

IDTheftSecurity.com

member since

2010

location

Boston

Summary profile See full profile »
Security analyst, published author, television news correspondent. Deliver presentations througho...

Robert's expertise

Who is commenting on Robert's posts

Otmane EL RHAZI
Ketharaman Swaminathan
Boris Taratine
Michael Rosenstein
Fred Pyziak
Matt Scott
Paul Love
Mike McCormack