• Latest
  • Trending
QR Security – Are You Ready?

QR Security – Are You Ready?

December 30, 2021
Inaugural AfCFTA Conference on Women and Youth in Trade

Inaugural AfCFTA Conference on Women and Youth in Trade

September 6, 2022
Instagram fined €405m over children’s data privacy

Instagram fined €405m over children’s data privacy

September 6, 2022
8 Most Common Causes of a Data Breach

5.7bn data entries found exposed on Chinese VPN

August 18, 2022
Fibre optic interconnection linking Cameroon and Congo now operational

Fibre optic interconnection linking Cameroon and Congo now operational

July 15, 2022
Ericsson and MTN Rwandacell Discuss their Long-Term Partnership

Ericsson and MTN Rwandacell Discuss their Long-Term Partnership

July 15, 2022
Airtel Africa Purchases $42M Worth of Additional Spectrum

Airtel Africa Purchases $42M Worth of Additional Spectrum

July 15, 2022
Huawei steps up drive for Kenyan talent

Huawei steps up drive for Kenyan talent

July 15, 2022
TSMC predicts Q3 revenue boost thanks to increased iPhone 13 demand

TSMC predicts Q3 revenue boost thanks to increased iPhone 13 demand

July 15, 2022
Facebook to allow up to five profiles tied to one account

Facebook to allow up to five profiles tied to one account

July 15, 2022
Top 10 apps built and managed in Ghana

Top 10 apps built and managed in Ghana

July 15, 2022
MTN Group to Host the 2nd Edition of the MoMo API Hackathon

MTN Group to Host the 2nd Edition of the MoMo API Hackathon

July 15, 2022
KIOXIA Introduce JEDEC XFM Removable Storage with PCIe/NVMe Spec

KIOXIA Introduce JEDEC XFM Removable Storage with PCIe/NVMe Spec

July 15, 2022
  • Consumer Watch
  • Kids Page
  • Directory
  • Events
  • Reviews
Saturday, 28 January, 2023
  • Login
itechnewsonline.com
  • Home
  • Tech
  • Africa Tech
  • InfoSEC
  • Data Science
  • Data Storage
  • Business
  • Opinion
Subscription
Advertise
No Result
View All Result
itechnewsonline.com
No Result
View All Result

QR Security – Are You Ready?

by ITECHNEWS
December 30, 2021
in Leading Stories, Opinion
0 0
0
QR Security – Are You Ready?

Contact-free and convenient, quick response (QR) codes came into their own as the pandemic progressed – for everything from marketing to checking into locations and even submitting COVID-19 test results.

 

YOU MAY ALSO LIKE

Inaugural AfCFTA Conference on Women and Youth in Trade

Instagram fined €405m over children’s data privacy

Unfortunately, few consumers realize that cyber-attackers can use this technology to distribute malware. A poll by MobileIron in 2020 reveals that only 61% of respondents know that QR codes can open a URL and 49% that a QR code – essentially being a hidden link into which malware can be easily embedded – can download an application.

 

Poor Public Awareness

 

Only a few respondents indicate they understand that QR codes can make payments, phone calls or add a ‘follow’ to social. In addition, 71% can’t tell the difference between a legitimate and a dangerous QR code that could be used for ‘Qshing‘ – whether malware injection or authentication abuses.

 

A quarter of respondents confirm that a QR code they scanned has taken them to a dubious-looking website or something else unexpected. Malicious QR codes can add a compromised network to a device’s preferred list, including a credential that enables automatic connection for a ‘man in the middle’ attack.

 

Criminals can easily create and customize their own QR codes using freeware; fake Bitcoin QR generators have already relieved hopeful crypto investors of vast sums.

 

Yet, just how many commercials or op-eds have you seen that alert or attempt to educate consumers – or businesses, for that matter – on the need for vigilance and threat protection when using these codes?

 

The upshot of this is that it has now become critical for organizations to develop and apply stringent security strategies across all mobile media use, including marketing campaigns.

 

Include QR in Education

 

I have not yet seen educational practices adopted for QR codes, which need to change in the current climate. For example, while red teaming and phishing training concerning emails and text messages are often standard practice in the workplace, I have not yet seen such practices adopted for QR codes. This is something that needs to change in the current climate and become embedded into overall security hygiene methods.

 

This should include education on using web filters and not trusting emails from unknown senders – to treat QR codes the same as a hyperlink in an email, and – in the ‘real world’ – to check for and remove any different codes that have been pasted on top before scanning. Before scanning any QR code, users should always first ask whether there is any way to verify its legitimacy.

 

The next key pillar of effective response to QR threat involves the choices around cybersecurity technology.

 

Traditional endpoint protection solutions can struggle to identify the latest malware injection vectors. QR scanning, of course, is not a new technology – it was invented in 1994 – but its increased popularity means it has now entered the awareness of more criminals working on ways to hijack legitimate online resources for their own nefarious ends.

 

Multilayering and Management

 

Investing in effective endpoint protection that can detect and isolate these malware processes will reduce risk and enable the organization to avoid adding so-called technical debt – avoiding the cost of playing catch-up down the track.

Failure to address the risks and concerns around QR, as part of an agile, multilayered security approach, could limit the potential for these easy-to-use, convenient codes to become widely adopted across all walks of life.

 

As ubiquitous parts of our daily life deployed alongside best-practice security, QR codes could become a true go-to tool for safely sharing, checking and gathering information, facilitating easy interactivity and the engagement that spurs badly-needed growth in multiple markets.

Source: Zach Fleming Principal Architect, Integrity360
Tags: QR Security
ShareTweetShare
Plugin Install : Subscribe Push Notification need OneSignal plugin to be installed.

Search

No Result
View All Result

Recent News

Inaugural AfCFTA Conference on Women and Youth in Trade

Inaugural AfCFTA Conference on Women and Youth in Trade

September 6, 2022
Instagram fined €405m over children’s data privacy

Instagram fined €405m over children’s data privacy

September 6, 2022
8 Most Common Causes of a Data Breach

5.7bn data entries found exposed on Chinese VPN

August 18, 2022

About What We Do

itechnewsonline.com

We bring you the best Premium Tech News.

Recent News With Image

Inaugural AfCFTA Conference on Women and Youth in Trade

Inaugural AfCFTA Conference on Women and Youth in Trade

September 6, 2022
Instagram fined €405m over children’s data privacy

Instagram fined €405m over children’s data privacy

September 6, 2022

Recent News

  • Inaugural AfCFTA Conference on Women and Youth in Trade September 6, 2022
  • Instagram fined €405m over children’s data privacy September 6, 2022
  • 5.7bn data entries found exposed on Chinese VPN August 18, 2022
  • Fibre optic interconnection linking Cameroon and Congo now operational July 15, 2022
  • Home
  • InfoSec
  • Opinion
  • Africa Tech
  • Data Storage

© 2021-2022 iTechNewsOnline.Com - Powered by BackUPDataSystems

No Result
View All Result
  • Home
  • Tech
  • Africa Tech
  • InfoSEC
  • Data Science
  • Data Storage
  • Business
  • Opinion

© 2021-2022 iTechNewsOnline.Com - Powered by BackUPDataSystems

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Go to mobile version