Beware before you scan a QR Code
Copyright Frictionless Security LLC

Beware before you scan a QR Code

A skillfully crafted flyer, persuasive marketing collateral, and a well-designed website all may share one thing: a QR Code that urges you to scan it and go to the destination it directs you to. You scan the innocent-looking, cute QR Code, and it dutifully takes you somewhere unknown in the jungle of the Worldwide Web. How do you know it is not a booby trap?

QR code spoofing can pose significant risks, especially when users blindly trust QR codes and interact with malicious sites. Here’s how one can mitigate such risks and avoid falling victim to such attacks:

Steps to Mitigate QR Code Spoofing Risks:

1. Verify the Source of the QR Code

  • Physical Location: If you encounter a QR code in a public place, inspect it to ensure it hasn’t been tampered with (e.g., stickers placed over legitimate QR codes, tampering with the flyer, etc.).
  • Online Sources: Only scan QR codes from trusted websites, apps, or sources.

2. Preview the URL Before Interacting

  • You can use a QR code scanner app or smartphone feature that shows the URL before redirecting. Please don't proceed if the URL looks suspicious, misspelled, or unrelated to the expected source.

3. Do Not Make Blind Payments

  • Before making a payment, ensure the site is legitimate by checking:

? The URL structure (e.g., HTTPS, correct domain spelling).

? Secure payment symbols (e.g., a padlock icon in the browser).

4. Enable Two-Factor Authentication (2FA)

  • Even if credentials are compromised, 2FA provides an extra layer of security. It's best to use app-based 2FA over SMS where possible. The SMS may not be secure and is prone to man-in-the-middle attacks.

5. Educate Yourself on Red Flags

  • Please be careful of unusual requests, such as QR codes leading to unexpected payment pages or requests for login credentials.

6. Regularly Monitor Your Accounts

? Frequently review bank and credit card transactions to detect unauthorized activity early.


Finally, always ask yourself why you are scanning the QR code and not accessing the payment portal, website, or service directly through their official apps or websites. Do you know if you are too lazy to find the official address? Is it just because it is convenient? Please consider the risks before you scan a QR Code and follow the above six safeguards.

Happy interneting!

要查看或添加评论,请登录

Sanjay Mathur CISSP, CISM, CRISC的更多文章

  • Data Confidentiality and Data Privacy

    Data Confidentiality and Data Privacy

    While data confidentiality concerns securing information from unauthorized access, data privacy concerns the…

  • Skills Required for InfoSec and CyberSec Professionals

    Skills Required for InfoSec and CyberSec Professionals

    Following my article on LinkedIn a few days back, there was an overwhelming response and many follow-up questions about…

  • Are information security and cyber security the same?

    Are information security and cyber security the same?

    There are fundamental differences between information and cyber security, with some overlaps and similarities. It is…

    3 条评论
  • The risk of not managing risk

    The risk of not managing risk

    Risk is a simple function of the probability of an unwanted outcome within all possible events and resources. This…

  • Downstream controls are harder to implement

    Downstream controls are harder to implement

    I learned a lesson early in my career as a security architect. It was a simple lesson: In a workflow, downstream…

    5 条评论
  • When strong security becomes our biggest vulnerability

    When strong security becomes our biggest vulnerability

    While we spend our resources and skills to make our weapons of defense more sophisticated to defend us better, the…

  • Frictionless Security Theorem

    Frictionless Security Theorem

    The effectiveness of security control is inversely proportionate to the complexity of its infrastructure and the…

    3 条评论
  • The SOC Jigsaw Puzzle

    The SOC Jigsaw Puzzle

    A frequently asked question from our prospect base. “Which SOC certificate is appropriate for me?” The basic purpose of…

  • Demystifying the risk of cloud-only service

    Demystifying the risk of cloud-only service

    FS Advisory to Startup Growth Companies: How to mitigate the top security risks for Cloud only services There is a…

    2 条评论
  • Overwhelmed by large third-party risk mitigation (TPRM) questionnaire?

    Overwhelmed by large third-party risk mitigation (TPRM) questionnaire?

    When your prospect or customer gives you a 900-questions to assess your information security stance, and it seems like…

社区洞察

其他会员也浏览了