23 October 2014

Identity Theft Expert

Robert Siciliano - IDTheftSecurity.com

519 | posts 1,324,961 | views 59 | comments

QR Codes Could Deliver Malware

26 March 2012  |  1806 views  |  2

You’ve seen barcodes all your life. So you know what they look like: rectangles “boxes” comprised of a series of vertical lines. When a cashier scans a barcode, you hear a familiar beep and you are charged for that item.

A QR code looks different and offers more functionality. QR stands for “quick response.” Smartphones can download QR readers that use the phone’s built-in camera to read these codes. When the QR code reader application is open and the camera detects a QR code, the application beeps and asks you what you want to do next.

Today we see QR codes appearing in magazine advertisements and articles, on signs and billboards; anywhere a mobile marketer wants to allow information to be captured, whether in print or in public spaces, and facilitate digital interaction. Pretty much anyone can create a QR codes.

Unfortunately, that’s where the cybercriminals come in. While QR codes make it easy to connect with legitimate online properties, they also make it easy for hackers to distribute malware.

QR code infections are relatively new. A QR scam works because, as with a shortened URL, the link destination is obscured by the link itself. Once scanned, a QR code may link to an malicious website or download an unwanted application or mobile virus.

Here’s some ways to protect yourself from falling victim to malicious QR codes:

Be suspicious of QR codes that offer no context explaining them. Malicious codes often appear with little or no text.

If you arrive on a website via a QR code, never provide your personal or log in information since it could be a phishing attempt.

Use a QR reader that offers you a preview of the URL that you have scanned so that you can see if it looks suspicious before you go there.

Use complete mobile device security software, which includes anti-virus, anti-theft and web and app protection and can warn you of dangerous websites embedded in QR codes.

TagsSecurityRisk & regulation

Comments: (3)

Brett King - Moven - New York | 26 March, 2012, 14:48

So could this link. Doesn't mean all links or URLs are evil...

Be the first to give this comment the thumbs up 0 thumb ups! (Log in to thumb up)
Robert Siciliano - IDTheftSecurity.com - Boston | 26 March, 2012, 14:54

Correct, but most people dont look at a QR code as a link. So heads up. 

Be the first to give this comment the thumbs up 0 thumb ups! (Log in to thumb up)
Ketharaman Swaminathan - GTM360 Marketing Solutions - Pune | 27 March, 2012, 19:14

Agree with your suggestion #s 1, 2 and 4.

However, re. your suggestion #3, "Use a QR reader that offers you a preview of the URL that you have scanned so that you can see if it looks suspicious before you go there.", since it's customary to construct QR codes out of shortened URLs, I'm not sure how one can figure out if the URL looks suspicious or not. For example, a QR code for this blog post page (http://www.finextra.com/community/fullblog.aspx?blogid=6371) could be constructed out of its shortened version http://goo.gl/szlRT, which neither looks genuine nor suspicious.

Be the first to give this comment the thumbs up 0 thumb ups! (Log in to thumb up)
Comment on this story (membership required)
Log in to receive notifications when someone posts a comment

Latest posts from Robert

3 Stupid Simple Tips to protect your Identity

22 October 2014  |  618 views  |  0  |  Recommends 0 TagsSecurity

6 Ways to prevent Social Engineering Attacks

14 October 2014  |  620 views  |  0  |  Recommends 0 TagsSecurity

7 ways to prevent Data Theft when traveling

10 October 2014  |  626 views  |  0  |  Recommends 0 TagsSecurity

PC Hard Drive Maintenance 101

07 October 2014  |  1266 views  |  0  |  Recommends 0 TagsSecurity

8 Tips to Credit Card Security

03 October 2014  |  2242 views  |  0  |  Recommends 0 TagsSecurity
name

Robert Siciliano

job title

Security Analyst

company name

IDTheftSecurity.com

member since

2010

location

Boston

Summary profile See full profile »
Security analyst, published author, television news correspondent. Deliver presentations througho...

Robert's expertise

Who is commenting on Robert's posts

Otmane EL RHAZI
Ketharaman Swaminathan
Boris Taratine
Michael Rosenstein
Fred Pyziak
Matt Scott
Paul Love
Mike McCormack