{"id":13790,"date":"2022-06-13T08:04:40","date_gmt":"2022-06-13T08:04:40","guid":{"rendered":"http:\/\/3.126.211.109\/?p=13790"},"modified":"2023-05-09T16:04:58","modified_gmt":"2023-05-09T16:04:58","slug":"everybody-is-excited-about-the-qr-code-but-be-careful-of-the-easy-scanning-process","status":"publish","type":"post","link":"https:\/\/www.cyberguru.it\/en\/2022\/06\/13\/everybody-is-excited-about-the-qr-code-but-be-careful-of-the-easy-scanning-process\/","title":{"rendered":"Everybody is excited about the QR Code. But be careful of the easy scanning process.\u00a0"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<p>The QR code was an odd word and a somewhat incomprehensible pattern until a few years ago; today, it has become something everyone knows, and it now seems impossible to do without it. Some people even love to tattoo it on their skin to have it always with them.\u00a0\u00a0\u00a0\u00a0<\/p>\n<\/p>\n<h5><strong>But what exactly is a QR code?<\/strong><\/h5>\n<\/p>\n<p>It\u2019s a square, two-dimensional barcode, and its primary function is to store information and data. A single code can have up to 7,089 numeric characters and 4,296 alphanumeric characters.<\/p>\n<\/p>\n<p>QR stands for \u201cQuick Response.\u201d This is precisely because the code is known for the speed it provides information decoded by mobile devices. Therefore, to access any archive of information (which could simply be a restaurant\u2019s menu), it is sufficient to frame the code with your cell phone camera, and, in no time at all, you will be directed to the desired page.\u00a0<\/p>\n<\/p>\n<p>It was invented in the early \u201990s when an engineer from the Denso Wave company developed a method to keep track of vehicle components in the automotive industry during their assembly. He drew inspiration from the boards used in the traditional Chinese game Go, the same game used in the development of DeepMind\u2019s (Google) AlphaGo artificial intelligence.\u00a0\u00a0\u00a0<\/p>\n<\/p>\n<p>It first became popular in Japan, where it was used mainly in newspaper and magazine ads and street billboards. In Europe and the United States, this kind of 2D technology spread only around the end of the year 2000 due to the expansion of the smartphone market. The latter is, in fact, the perfect tool to convey the intelligent information of QR codes.\u00a0\u00a0<\/p>\n<\/p>\n<p>QR codes have become a commonly used tool that allows the transmission of information of any kind. Right up to the ultimate advancement of the Green Pass. A QR code capable of containing our health information and granting us access to various public and private services.<\/p>\n<\/p>\n<p>&nbsp;<\/p>\n<\/p>\n<h5><strong><strong>Quishing, the risks hidden in the QR Code<\/strong><\/strong><\/h5>\n<\/p>\n<p>This tool, which like all technology, can facilitate everyday life and access to numerous services; however, it must be \u201chandled\u201d with care because it also presents dangerous scenarios.\u00a0\u00a0<\/p>\n<\/p>\n<p>So much so that in a recent report, McAfee listed Quishing (\u201cmisuse and malicious use of QR codes\u201d) as one of the five main threats for the years ahead.\u202f The technique used goes something like this. Victims scan malicious QR codes and end up on fraudulent websites. You always have to provide some \u201cessential\u201d data such as username, password, and payment information to gain access. It is needless to say that obviously, all this information ends up in the hands of cybercriminals. In some other cases, just scanning the QR code is enough to download malware to your device.\u00a0\u00a0<\/p>\n<\/p>\n<p>The issue has become more and more worrisome, so much so that last January, the FBI, issued a\u00a0<strong>warning<\/strong>\u00a0recommending Americans to be very careful with this type of attack.\u202fIn particular, pay attention to QR codes used as a payment method. The FBI has made it known that criminals can steal money from unsuspecting victims simply by redirecting payments to malicious sites.\u00a0\u00a0<\/p>\n<\/p>\n<p>The warning came just after the Massachusetts State Police made it public that some QR codes used on parking meters connected users to fraudulent payment sites.\u202fInstead of paying for parking, the victim sent payment information to the scammers.\u00a0\u00a0<\/p>\n<\/p>\n<p>.<strong>What can you do to protect yourself from Quishing?\u00a0<\/strong>\u00a0<\/p>\n<\/p>\n<p>Knowing that on the web, it is human error that opens the doors to criminals when we are dealing, as in this case, with new and widespread technology, we must hone the antennas of attentiveness and awareness. The fact that the majority of users are uninformed about the obscure aspects of the use of QR codes, in fact, readily offers the possibility to hackers who are always looking for new ways to access their favorite crime.<\/p>\n<\/p>\n<p>In general, therefore, any QR code should be considered suspicious, and before scanning it, you should make sure of its credibility.\u00a0\u00a0\u00a0\u00a0<\/p>\n<\/p>\n<p>In their warning, the FBI lists a series of precautions to avoid unpleasant surprises. Good habits to follow such as:\u00a0<\/p>\n<\/p>\n<ul>\n<ul><\/ul>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<ul>\n<li>After scanning a QR code, check the URL to make sure it is the intended site and that it appears authentic.\u202fA fraudulent domain name may appear similar to the authentic one but with some typos or misplaced letters.\u00a0\u00a0<\/li>\n<\/ul>\n<\/ul>\n<\/p>\n<ul>\n<ul>\n<li>Before submitting sensitive personal or financial data to a site, always be very careful. But be even more cautious if you have used a QR code to access the site.\u00a0\u00a0<\/li>\n<\/ul>\n<\/ul>\n<\/p>\n<ul>\n<ul>\n<li>Before scanning a QR code, make sure that the code has not been tampered with, such as a sticker placed over the original code.\u00a0<\/li>\n<\/ul>\n<\/ul>\n<\/p>\n<ul>\n<ul>\n<li>Avoid downloading apps from a QR code. For a more secure download, use the official APP Stores.\u00a0\u00a0<\/li>\n<\/ul>\n<\/ul>\n<\/p>\n<ul>\n<ul>\n<li>\u00a0Be wary if someone asks you to make a payment using a QR code. Especially if the purchase was completed recently and the payment was not successful. In these cases, contact directly, using only authorized methods, the company requesting the payment to ask for clarification.\u202f\u00a0\u00a0<\/li>\n<\/ul>\n<\/ul>\n<\/p>\n<ul>\n<ul>\n<li>Remember that it is not necessary to download any APP to scan QR codes.\u202fMost cell phones have a scanner integrated into the camera, reducing the risks of downloading malicious APPs to your device.\u00a0\u00a0<\/li>\n<\/ul>\n<\/ul>\n<\/p>\n<ul>\n<ul>\n<li>\u00a0Even when a QR code appears to be from a reputable source, always verify its actual origin before using it.<\/li>\n<\/ul>\n<\/ul>\n<\/p>\n<h5><strong><strong>Education and training to avoid unwitting scans.<\/strong><\/strong><\/h5>\n<\/p>\n<p>Given that Quishing represents one of the top cyber risks today, it is clear that this must be included in corporate Cyber Security Awareness training programs without a shadow of a doubt. Effective training on the risks of using these tools can ensure that all employees, especially those who also use company devices for personal use, are well-trained, aware, and think twice before clicking or scanning QR codes.\u00a0<strong><\/strong><\/p>\n<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The QR code was an odd word and a somewhat incomprehensible pattern until a few years ago; today, it has become something everyone knows, and it now seems impossible to do without it. Some people even love to tattoo it on their skin to have it always with them.\u00a0\u00a0\u00a0\u00a0 But what exactly is a QR [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":13791,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"<!-- wp:paragraph -->\n<p>The QR code was an odd word and a somewhat incomprehensible pattern until a few years ago; today, it has become something everyone knows, and it now seems impossible to do without it. Some people even love to tattoo it on their skin to have it always with them.&nbsp;&nbsp;&nbsp;&nbsp;<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:heading {\"level\":5} -->\n<h5><strong>But what exactly is a QR code?<\/strong><\/h5>\n<!-- \/wp:heading -->\n\n<!-- wp:paragraph -->\n<p>It\u2019s a square, two-dimensional barcode, and its primary function is to store information and data. A single code can have up to 7,089 numeric characters and 4,296 alphanumeric characters.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>QR stands for \u201cQuick Response.\u201d This is precisely because the code is known for the speed it provides information decoded by mobile devices. Therefore, to access any archive of information (which could simply be a restaurant\u2019s menu), it is sufficient to frame the code with your cell phone camera, and, in no time at all, you will be directed to the desired page.&nbsp;<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>It was invented in the early \u201990s when an engineer from the Denso Wave company developed a method to keep track of vehicle components in the automotive industry during their assembly. He drew inspiration from the boards used in the traditional Chinese game Go, the same game used in the development of DeepMind\u2019s (Google) AlphaGo artificial intelligence.&nbsp;&nbsp;&nbsp;<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>It first became popular in Japan, where it was used mainly in newspaper and magazine ads and street billboards. In Europe and the United States, this kind of 2D technology spread only around the end of the year 2000 due to the expansion of the smartphone market. The latter is, in fact, the perfect tool to convey the intelligent information of QR codes.&nbsp;&nbsp;<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>QR codes have become a commonly used tool that allows the transmission of information of any kind. Right up to the ultimate advancement of the Green Pass. A QR code capable of containing our health information and granting us access to various public and private services.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>&nbsp;&nbsp;<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:heading {\"level\":5} -->\n<h5><strong><strong>Quishing, the risks hidden in the QR Code<\/strong><\/strong><\/h5>\n<!-- \/wp:heading -->\n\n<!-- wp:paragraph -->\n<p>This tool, which like all technology, can facilitate everyday life and access to numerous services; however, it must be \u201chandled\u201d with care because it also presents dangerous scenarios.&nbsp;&nbsp;<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>So much so that in a recent report, McAfee listed Quishing (\u201cmisuse and malicious use of QR codes\u201d) as one of the five main threats for the years ahead.\u202f The technique used goes something like this. Victims scan malicious QR codes and end up on fraudulent websites. You always have to provide some \u201cessential\u201d data such as username, password, and payment information to gain access. It is needless to say that obviously, all this information ends up in the hands of cybercriminals. In some other cases, just scanning the QR code is enough to download malware to your device.&nbsp;&nbsp;<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>The issue has become more and more worrisome, so much so that last January, the FBI, issued a&nbsp;<strong>warning<\/strong>&nbsp;recommending Americans to be very careful with this type of attack.\u202fIn particular, pay attention to QR codes used as a payment method. The FBI has made it known that criminals can steal money from unsuspecting victims simply by redirecting payments to malicious sites.&nbsp;&nbsp;<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>The warning came just after the Massachusetts State Police made it public that some QR codes used on parking meters connected users to fraudulent payment sites.\u202fInstead of paying for parking, the victim sent payment information to the scammers.&nbsp;&nbsp;<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>.<strong>What can you do to protect yourself from Quishing?&nbsp;<\/strong>&nbsp;<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>Knowing that on the web, it is human error that opens the doors to criminals when we are dealing, as in this case, with new and widespread technology, we must hone the antennas of attentiveness and awareness. The fact that the majority of users are uninformed about the obscure aspects of the use of QR codes, in fact, readily offers the possibility to hackers who are always looking for new ways to access their favorite crime.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>In general, therefore, any QR code should be considered suspicious, and before scanning it, you should make sure of its credibility.&nbsp;&nbsp;&nbsp;&nbsp;<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>In their warning, the FBI lists a series of precautions to avoid unpleasant surprises. Good habits to follow such as:&nbsp;<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:list -->\n<ul><!-- wp:list-item -->\n<li>After scanning a QR code, check the URL to make sure it is the intended site and that it appears authentic.\u202fA fraudulent domain name may appear similar to the authentic one but with some typos or misplaced letters.&nbsp;&nbsp;<\/li>\n<!-- \/wp:list-item -->\n\n<!-- wp:list-item -->\n<li>Before submitting sensitive personal or financial data to a site, always be very careful. But be even more cautious if you have used a QR code to access the site.&nbsp;&nbsp;<\/li>\n<!-- \/wp:list-item -->\n\n<!-- wp:list-item -->\n<li>Before scanning a QR code, make sure that the code has not been tampered with, such as a sticker placed over the original code.&nbsp;<\/li>\n<!-- \/wp:list-item -->\n\n<!-- wp:list-item -->\n<li>Avoid downloading apps from a QR code. For a more secure download, use the official APP Stores.&nbsp;&nbsp;<\/li>\n<!-- \/wp:list-item -->\n\n<!-- wp:list-item -->\n<li>&nbsp;Be wary if someone asks you to make a payment using a QR code. Especially if the purchase was completed recently and the payment was not successful. In these cases, contact directly, using only authorized methods, the company requesting the payment to ask for clarification.\u202f&nbsp;&nbsp;<\/li>\n<!-- \/wp:list-item -->\n\n<!-- wp:list-item -->\n<li>Remember that it is not necessary to download any APP to scan QR codes.\u202fMost cell phones have a scanner integrated into the camera, reducing the risks of downloading malicious APPs to your device.&nbsp;&nbsp;<\/li>\n<!-- \/wp:list-item -->\n\n<!-- wp:list-item -->\n<li>&nbsp;Even when a QR code appears to be from a reputable source, always verify its actual origin before using it.<\/li>\n<!-- \/wp:list-item --><\/ul>\n<!-- \/wp:list -->\n\n<!-- wp:heading {\"level\":5} -->\n<h5><strong><strong>Education and training to avoid unwitting scans.<\/strong><\/strong><\/h5>\n<!-- \/wp:heading -->\n\n<!-- wp:paragraph -->\n<p>Given that Quishing represents one of the top cyber risks today, it is clear that this must be included in corporate Cyber Security Awareness training programs without a shadow of a doubt. Effective training on the risks of using these tools can ensure that all employees, especially those who also use company devices for personal use, are well-trained, aware, and think twice before clicking or scanning QR codes.&nbsp;&nbsp;<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:group {\"backgroundColor\":\"very-light-gray\"} -->\n<div class=\"wp-block-group has-very-light-gray-background-color has-background\"><!-- wp:paragraph {\"align\":\"center\",\"textColor\":\"luminous-vivid-orange\"} -->\n<p class=\"has-text-align-center has-luminous-vivid-orange-color has-text-color\"><a aria-label=\" (apre in una nuova scheda)\" rel=\"noreferrer noopener\" href=\"https:\/\/www.cyberguru.it\/soluzioni-cyber-security-awareness\/\" target=\"_blank\"><strong>To learn more about Cyber Guru Awareness <\/strong><\/a><\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph {\"align\":\"center\",\"textColor\":\"luminous-vivid-orange\"} -->\n<p class=\"has-text-align-center has-luminous-vivid-orange-color has-text-color\"><a href=\"https:\/\/www.cyberguru.eu\/cyber-guru-phishing\/\"><strong>To learn more about Cyber Guru Phishing<\/strong><\/a>  <\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph {\"align\":\"center\",\"textColor\":\"luminous-vivid-orange\"} -->\n<p class=\"has-text-align-center has-luminous-vivid-orange-color has-text-color\"><a href=\"https:\/\/www.cyberguru.eu\/cyber-guru-channel\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>To learn more about Cyber Guru Channel<\/strong><\/a><\/p>\n<!-- \/wp:paragraph --><\/div>\n<!-- \/wp:group -->","_et_gb_content_width":"","content-type":"","footnotes":""},"categories":[422],"tags":[487,468,470,488,493],"class_list":["post-13790","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-en","tag-cyber-awareness-en-2","tag-cyber-security-en-2","tag-cyber-security-awareness-en-3","tag-cybersecurity-trends-en-2","tag-qr-code"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Everybody is excited about the QR Code. But be careful of the easy scanning process.\u00a0 - Cyber Guru<\/title>\n<meta name=\"description\" content=\"Nowadays everybody uses QR codes on a daily basis. Read more to learn about this scanning process and the hidden threats behind it.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberguru.it\/en\/2022\/06\/13\/everybody-is-excited-about-the-qr-code-but-be-careful-of-the-easy-scanning-process\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Everybody is excited about the QR Code. But be careful of the easy scanning process.\u00a0\" \/>\n<meta property=\"og:description\" content=\"Nowadays everybody uses QR codes on a daily basis. Read more to learn about this scanning process and the hidden threats behind it.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberguru.it\/en\/2022\/06\/13\/everybody-is-excited-about-the-qr-code-but-be-careful-of-the-easy-scanning-process\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Guru\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-13T08:04:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-09T16:04:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/06\/Qishing.png\" \/>\n\t<meta property=\"og:image:width\" content=\"873\" \/>\n\t<meta property=\"og:image:height\" content=\"507\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Cyber Guru\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Cyber Guru\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2022\\\/06\\\/13\\\/everybody-is-excited-about-the-qr-code-but-be-careful-of-the-easy-scanning-process\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2022\\\/06\\\/13\\\/everybody-is-excited-about-the-qr-code-but-be-careful-of-the-easy-scanning-process\\\/\"},\"author\":{\"name\":\"Cyber Guru\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#\\\/schema\\\/person\\\/7ee941e099c92eb9ea57fceee4ec4736\"},\"headline\":\"Everybody is excited about the QR Code. But be careful of the easy scanning process.\u00a0\",\"datePublished\":\"2022-06-13T08:04:40+00:00\",\"dateModified\":\"2023-05-09T16:04:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2022\\\/06\\\/13\\\/everybody-is-excited-about-the-qr-code-but-be-careful-of-the-easy-scanning-process\\\/\"},\"wordCount\":1079,\"image\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2022\\\/06\\\/13\\\/everybody-is-excited-about-the-qr-code-but-be-careful-of-the-easy-scanning-process\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Qishing.png\",\"keywords\":[\"Cyber Awareness\",\"Cyber Security\",\"Cyber Security Awareness\",\"cybersecurity trends\",\"qr code\"],\"articleSection\":[\"Security Awareness\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2022\\\/06\\\/13\\\/everybody-is-excited-about-the-qr-code-but-be-careful-of-the-easy-scanning-process\\\/\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2022\\\/06\\\/13\\\/everybody-is-excited-about-the-qr-code-but-be-careful-of-the-easy-scanning-process\\\/\",\"name\":\"Everybody is excited about the QR Code. But be careful of the easy scanning process.\u00a0 - Cyber Guru\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2022\\\/06\\\/13\\\/everybody-is-excited-about-the-qr-code-but-be-careful-of-the-easy-scanning-process\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2022\\\/06\\\/13\\\/everybody-is-excited-about-the-qr-code-but-be-careful-of-the-easy-scanning-process\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Qishing.png\",\"datePublished\":\"2022-06-13T08:04:40+00:00\",\"dateModified\":\"2023-05-09T16:04:58+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#\\\/schema\\\/person\\\/7ee941e099c92eb9ea57fceee4ec4736\"},\"description\":\"Nowadays everybody uses QR codes on a daily basis. Read more to learn about this scanning process and the hidden threats behind it.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2022\\\/06\\\/13\\\/everybody-is-excited-about-the-qr-code-but-be-careful-of-the-easy-scanning-process\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2022\\\/06\\\/13\\\/everybody-is-excited-about-the-qr-code-but-be-careful-of-the-easy-scanning-process\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2022\\\/06\\\/13\\\/everybody-is-excited-about-the-qr-code-but-be-careful-of-the-easy-scanning-process\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Qishing.png\",\"contentUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Qishing.png\",\"width\":873,\"height\":507,\"caption\":\"Qishing\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2022\\\/06\\\/13\\\/everybody-is-excited-about-the-qr-code-but-be-careful-of-the-easy-scanning-process\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/home-page-v2-draft\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Everybody is excited about the QR Code. But be careful of the easy scanning process.\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/\",\"name\":\"Cyber Guru\",\"description\":\"Security Awareness Training That Works!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#\\\/schema\\\/person\\\/7ee941e099c92eb9ea57fceee4ec4736\",\"name\":\"Cyber Guru\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a5bcbfd3ec7ac7fa68adccd624c2ccab51a63012445e6ec3372c348524942a49?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a5bcbfd3ec7ac7fa68adccd624c2ccab51a63012445e6ec3372c348524942a49?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a5bcbfd3ec7ac7fa68adccd624c2ccab51a63012445e6ec3372c348524942a49?s=96&d=mm&r=g\",\"caption\":\"Cyber Guru\"},\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/author\\\/cyber-guru\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Everybody is excited about the QR Code. But be careful of the easy scanning process.\u00a0 - Cyber Guru","description":"Nowadays everybody uses QR codes on a daily basis. Read more to learn about this scanning process and the hidden threats behind it.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberguru.it\/en\/2022\/06\/13\/everybody-is-excited-about-the-qr-code-but-be-careful-of-the-easy-scanning-process\/","og_locale":"en_US","og_type":"article","og_title":"Everybody is excited about the QR Code. But be careful of the easy scanning process.\u00a0","og_description":"Nowadays everybody uses QR codes on a daily basis. Read more to learn about this scanning process and the hidden threats behind it.","og_url":"https:\/\/www.cyberguru.it\/en\/2022\/06\/13\/everybody-is-excited-about-the-qr-code-but-be-careful-of-the-easy-scanning-process\/","og_site_name":"Cyber Guru","article_publisher":"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise","article_published_time":"2022-06-13T08:04:40+00:00","article_modified_time":"2023-05-09T16:04:58+00:00","og_image":[{"width":873,"height":507,"url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/06\/Qishing.png","type":"image\/png"}],"author":"Cyber Guru","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Cyber Guru","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cyberguru.it\/en\/2022\/06\/13\/everybody-is-excited-about-the-qr-code-but-be-careful-of-the-easy-scanning-process\/#article","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/en\/2022\/06\/13\/everybody-is-excited-about-the-qr-code-but-be-careful-of-the-easy-scanning-process\/"},"author":{"name":"Cyber Guru","@id":"https:\/\/www.cyberguru.it\/en\/#\/schema\/person\/7ee941e099c92eb9ea57fceee4ec4736"},"headline":"Everybody is excited about the QR Code. But be careful of the easy scanning process.\u00a0","datePublished":"2022-06-13T08:04:40+00:00","dateModified":"2023-05-09T16:04:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cyberguru.it\/en\/2022\/06\/13\/everybody-is-excited-about-the-qr-code-but-be-careful-of-the-easy-scanning-process\/"},"wordCount":1079,"image":{"@id":"https:\/\/www.cyberguru.it\/en\/2022\/06\/13\/everybody-is-excited-about-the-qr-code-but-be-careful-of-the-easy-scanning-process\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/06\/Qishing.png","keywords":["Cyber Awareness","Cyber Security","Cyber Security Awareness","cybersecurity trends","qr code"],"articleSection":["Security Awareness"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cyberguru.it\/en\/2022\/06\/13\/everybody-is-excited-about-the-qr-code-but-be-careful-of-the-easy-scanning-process\/","url":"https:\/\/www.cyberguru.it\/en\/2022\/06\/13\/everybody-is-excited-about-the-qr-code-but-be-careful-of-the-easy-scanning-process\/","name":"Everybody is excited about the QR Code. But be careful of the easy scanning process.\u00a0 - Cyber Guru","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberguru.it\/en\/2022\/06\/13\/everybody-is-excited-about-the-qr-code-but-be-careful-of-the-easy-scanning-process\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberguru.it\/en\/2022\/06\/13\/everybody-is-excited-about-the-qr-code-but-be-careful-of-the-easy-scanning-process\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/06\/Qishing.png","datePublished":"2022-06-13T08:04:40+00:00","dateModified":"2023-05-09T16:04:58+00:00","author":{"@id":"https:\/\/www.cyberguru.it\/en\/#\/schema\/person\/7ee941e099c92eb9ea57fceee4ec4736"},"description":"Nowadays everybody uses QR codes on a daily basis. Read more to learn about this scanning process and the hidden threats behind it.","breadcrumb":{"@id":"https:\/\/www.cyberguru.it\/en\/2022\/06\/13\/everybody-is-excited-about-the-qr-code-but-be-careful-of-the-easy-scanning-process\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberguru.it\/en\/2022\/06\/13\/everybody-is-excited-about-the-qr-code-but-be-careful-of-the-easy-scanning-process\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cyberguru.it\/en\/2022\/06\/13\/everybody-is-excited-about-the-qr-code-but-be-careful-of-the-easy-scanning-process\/#primaryimage","url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/06\/Qishing.png","contentUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/06\/Qishing.png","width":873,"height":507,"caption":"Qishing"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberguru.it\/en\/2022\/06\/13\/everybody-is-excited-about-the-qr-code-but-be-careful-of-the-easy-scanning-process\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberguru.it\/en\/home-page-v2-draft\/"},{"@type":"ListItem","position":2,"name":"Everybody is excited about the QR Code. But be careful of the easy scanning process.\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberguru.it\/en\/#website","url":"https:\/\/www.cyberguru.it\/en\/","name":"Cyber Guru","description":"Security Awareness Training That Works!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberguru.it\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.cyberguru.it\/en\/#\/schema\/person\/7ee941e099c92eb9ea57fceee4ec4736","name":"Cyber Guru","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/a5bcbfd3ec7ac7fa68adccd624c2ccab51a63012445e6ec3372c348524942a49?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/a5bcbfd3ec7ac7fa68adccd624c2ccab51a63012445e6ec3372c348524942a49?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a5bcbfd3ec7ac7fa68adccd624c2ccab51a63012445e6ec3372c348524942a49?s=96&d=mm&r=g","caption":"Cyber Guru"},"url":"https:\/\/www.cyberguru.it\/en\/author\/cyber-guru\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/posts\/13790","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/comments?post=13790"}],"version-history":[{"count":6,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/posts\/13790\/revisions"}],"predecessor-version":[{"id":30281,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/posts\/13790\/revisions\/30281"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/media\/13791"}],"wp:attachment":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/media?parent=13790"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/categories?post=13790"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/tags?post=13790"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}