{"id":26258,"date":"2022-07-18T14:44:56","date_gmt":"2022-07-18T14:44:56","guid":{"rendered":"http:\/\/35.157.126.229\/2022\/07\/18\/cyber-card-23-qishing-beware-of-malicious-qr-codes\/"},"modified":"2024-05-02T15:53:21","modified_gmt":"2024-05-02T15:53:21","slug":"cyber-card-23-qishing-beware-of-malicious-qr-codes","status":"publish","type":"post","link":"https:\/\/www.cyberguru.it\/en\/2022\/07\/18\/cyber-card-23-qishing-beware-of-malicious-qr-codes\/","title":{"rendered":"Cyber Card #23 &#8211; Qishing beware of malicious QR codes"},"content":{"rendered":"\n<p>Il <a href=\"https:\/\/www.cyberguru.it\/2022\/08\/29\/cyber-pillola-26-qishing\/\" target=\"_blank\" rel=\"noreferrer noopener\">Qishing <\/a>\u00e8 una tecnica di attacco basata sulla possibilit\u00e0 che l\u2019ignara vittima inquadri un QR code \u201cmalevolo\u201d.<\/p>\n\n<p>Cosa fare per non caderne vittima?\u00a0<\/p>\n\n<p>La difesa principale resta quella di non scansionare tutto ci\u00f2 che ci circonda, soprattutto se il codice QR si trova su un volantino distribuito per strada o se \u00e8 maldestramente incollato sul tavolo di un ristorante, prestando molta attenzione nel verificare che il QR code non sia stato manomesso.<\/p>\n\n<p><em><strong>Questa Infografica ti fornir\u00e0 qualche utile consiglio per evitare di cadere vittima delle truffe pi\u00f9 conosciute!<\/strong><\/em><\/p>\n\n<p><\/p>\n\n<figure class=\"wp-block-image size-large is-resized\"><a href=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/07\/23IT-1.png\" target=\"_blank\" rel=\"noreferrer noopener\"><img decoding=\"async\" src=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/02\/23EN-1-724x1024.png\" alt=\"Qishing: attenzione ai QR code malevoli\" class=\"wp-image-25773\" style=\"width:823px;height:1164px\"\/><\/a><\/figure>","protected":false},"excerpt":{"rendered":"<p>Il Qishing \u00e8 una tecnica di attacco basata sulla possibilit\u00e0 che l\u2019ignara vittima inquadri un QR code \u201cmalevolo\u201d. Cosa fare per non caderne vittima?\u00a0 La difesa principale resta quella di non scansionare tutto ci\u00f2 che ci circonda, soprattutto se il codice QR si trova su un volantino distribuito per strada o se \u00e8 maldestramente incollato [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":25778,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"off","_et_pb_old_content":"","_et_gb_content_width":"","content-type":"","footnotes":""},"categories":[432],"tags":[829,830,831,487,585,470,832,637,595],"class_list":["post-26258","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-card-en","tag-cibertarjeta-en","tag-conciencia-cibernetica-en","tag-concienciacion-sobre-ciberseguridad-en","tag-cyber-awareness-en-2","tag-cyber-card-en","tag-cyber-security-awareness-en-3","tag-infografia-en","tag-infografica-en","tag-qishing-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cyber Card #23 - Qishing beware of malicious QR codes<\/title>\n<meta name=\"description\" content=\"Qishing is an attack technique based on the unsuspecting victim framing a &quot;malicious&quot; QR code, how can it be avoided?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberguru.it\/en\/2022\/07\/18\/cyber-card-23-qishing-beware-of-malicious-qr-codes\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Card #23 - Qishing beware of malicious QR codes\" \/>\n<meta property=\"og:description\" content=\"Qishing is an attack technique based on the unsuspecting victim framing a &quot;malicious&quot; QR code, how can it be avoided?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberguru.it\/en\/2022\/07\/18\/cyber-card-23-qishing-beware-of-malicious-qr-codes\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Guru\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-18T14:44:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-02T15:53:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/02\/23EN.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1440\" \/>\n\t<meta property=\"og:image:height\" content=\"810\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"m.baciucco\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"m.baciucco\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2022\\\/07\\\/18\\\/cyber-card-23-qishing-beware-of-malicious-qr-codes\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2022\\\/07\\\/18\\\/cyber-card-23-qishing-beware-of-malicious-qr-codes\\\/\"},\"author\":{\"name\":\"m.baciucco\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#\\\/schema\\\/person\\\/504cb09d8c1d11292c477e0c92c2a007\"},\"headline\":\"Cyber Card #23 &#8211; Qishing beware of malicious QR codes\",\"datePublished\":\"2022-07-18T14:44:56+00:00\",\"dateModified\":\"2024-05-02T15:53:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2022\\\/07\\\/18\\\/cyber-card-23-qishing-beware-of-malicious-qr-codes\\\/\"},\"wordCount\":97,\"image\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2022\\\/07\\\/18\\\/cyber-card-23-qishing-beware-of-malicious-qr-codes\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/23EN.png\",\"keywords\":[\"cibertarjeta\",\"Conciencia cibern\u00e9tica\",\"Concienciaci\u00f3n sobre ciberseguridad\",\"Cyber Awareness\",\"cyber card\",\"Cyber Security Awareness\",\"infograf\u00eda\",\"infografica\",\"Qishing\"],\"articleSection\":[\"Cyber Card\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2022\\\/07\\\/18\\\/cyber-card-23-qishing-beware-of-malicious-qr-codes\\\/\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2022\\\/07\\\/18\\\/cyber-card-23-qishing-beware-of-malicious-qr-codes\\\/\",\"name\":\"Cyber Card #23 - Qishing beware of malicious QR codes\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2022\\\/07\\\/18\\\/cyber-card-23-qishing-beware-of-malicious-qr-codes\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2022\\\/07\\\/18\\\/cyber-card-23-qishing-beware-of-malicious-qr-codes\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/23EN.png\",\"datePublished\":\"2022-07-18T14:44:56+00:00\",\"dateModified\":\"2024-05-02T15:53:21+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#\\\/schema\\\/person\\\/504cb09d8c1d11292c477e0c92c2a007\"},\"description\":\"Qishing is an attack technique based on the unsuspecting victim framing a \\\"malicious\\\" QR code, how can it be avoided?\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2022\\\/07\\\/18\\\/cyber-card-23-qishing-beware-of-malicious-qr-codes\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2022\\\/07\\\/18\\\/cyber-card-23-qishing-beware-of-malicious-qr-codes\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2022\\\/07\\\/18\\\/cyber-card-23-qishing-beware-of-malicious-qr-codes\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/23EN.png\",\"contentUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/23EN.png\",\"width\":1440,\"height\":810,\"caption\":\"Qishing\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2022\\\/07\\\/18\\\/cyber-card-23-qishing-beware-of-malicious-qr-codes\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/home-page-v2-draft\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Card #23 &#8211; Qishing beware of malicious QR codes\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/\",\"name\":\"Cyber Guru\",\"description\":\"Security Awareness Training That Works!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#\\\/schema\\\/person\\\/504cb09d8c1d11292c477e0c92c2a007\",\"name\":\"m.baciucco\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g\",\"caption\":\"m.baciucco\"},\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/author\\\/m-baciucco\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cyber Card #23 - Qishing beware of malicious QR codes","description":"Qishing is an attack technique based on the unsuspecting victim framing a \"malicious\" QR code, how can it be avoided?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberguru.it\/en\/2022\/07\/18\/cyber-card-23-qishing-beware-of-malicious-qr-codes\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Card #23 - Qishing beware of malicious QR codes","og_description":"Qishing is an attack technique based on the unsuspecting victim framing a \"malicious\" QR code, how can it be avoided?","og_url":"https:\/\/www.cyberguru.it\/en\/2022\/07\/18\/cyber-card-23-qishing-beware-of-malicious-qr-codes\/","og_site_name":"Cyber Guru","article_publisher":"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise","article_published_time":"2022-07-18T14:44:56+00:00","article_modified_time":"2024-05-02T15:53:21+00:00","og_image":[{"width":1440,"height":810,"url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/02\/23EN.png","type":"image\/png"}],"author":"m.baciucco","twitter_card":"summary_large_image","twitter_misc":{"Written by":"m.baciucco"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cyberguru.it\/en\/2022\/07\/18\/cyber-card-23-qishing-beware-of-malicious-qr-codes\/#article","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/en\/2022\/07\/18\/cyber-card-23-qishing-beware-of-malicious-qr-codes\/"},"author":{"name":"m.baciucco","@id":"https:\/\/www.cyberguru.it\/en\/#\/schema\/person\/504cb09d8c1d11292c477e0c92c2a007"},"headline":"Cyber Card #23 &#8211; Qishing beware of malicious QR codes","datePublished":"2022-07-18T14:44:56+00:00","dateModified":"2024-05-02T15:53:21+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cyberguru.it\/en\/2022\/07\/18\/cyber-card-23-qishing-beware-of-malicious-qr-codes\/"},"wordCount":97,"image":{"@id":"https:\/\/www.cyberguru.it\/en\/2022\/07\/18\/cyber-card-23-qishing-beware-of-malicious-qr-codes\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/02\/23EN.png","keywords":["cibertarjeta","Conciencia cibern\u00e9tica","Concienciaci\u00f3n sobre ciberseguridad","Cyber Awareness","cyber card","Cyber Security Awareness","infograf\u00eda","infografica","Qishing"],"articleSection":["Cyber Card"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cyberguru.it\/en\/2022\/07\/18\/cyber-card-23-qishing-beware-of-malicious-qr-codes\/","url":"https:\/\/www.cyberguru.it\/en\/2022\/07\/18\/cyber-card-23-qishing-beware-of-malicious-qr-codes\/","name":"Cyber Card #23 - Qishing beware of malicious QR codes","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberguru.it\/en\/2022\/07\/18\/cyber-card-23-qishing-beware-of-malicious-qr-codes\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberguru.it\/en\/2022\/07\/18\/cyber-card-23-qishing-beware-of-malicious-qr-codes\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/02\/23EN.png","datePublished":"2022-07-18T14:44:56+00:00","dateModified":"2024-05-02T15:53:21+00:00","author":{"@id":"https:\/\/www.cyberguru.it\/en\/#\/schema\/person\/504cb09d8c1d11292c477e0c92c2a007"},"description":"Qishing is an attack technique based on the unsuspecting victim framing a \"malicious\" QR code, how can it be avoided?","breadcrumb":{"@id":"https:\/\/www.cyberguru.it\/en\/2022\/07\/18\/cyber-card-23-qishing-beware-of-malicious-qr-codes\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberguru.it\/en\/2022\/07\/18\/cyber-card-23-qishing-beware-of-malicious-qr-codes\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cyberguru.it\/en\/2022\/07\/18\/cyber-card-23-qishing-beware-of-malicious-qr-codes\/#primaryimage","url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/02\/23EN.png","contentUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/02\/23EN.png","width":1440,"height":810,"caption":"Qishing"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberguru.it\/en\/2022\/07\/18\/cyber-card-23-qishing-beware-of-malicious-qr-codes\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberguru.it\/en\/home-page-v2-draft\/"},{"@type":"ListItem","position":2,"name":"Cyber Card #23 &#8211; Qishing beware of malicious QR codes"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberguru.it\/en\/#website","url":"https:\/\/www.cyberguru.it\/en\/","name":"Cyber Guru","description":"Security Awareness Training That Works!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberguru.it\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.cyberguru.it\/en\/#\/schema\/person\/504cb09d8c1d11292c477e0c92c2a007","name":"m.baciucco","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g","caption":"m.baciucco"},"url":"https:\/\/www.cyberguru.it\/en\/author\/m-baciucco\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/posts\/26258","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/comments?post=26258"}],"version-history":[{"count":8,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/posts\/26258\/revisions"}],"predecessor-version":[{"id":37855,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/posts\/26258\/revisions\/37855"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/media\/25778"}],"wp:attachment":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/media?parent=26258"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/categories?post=26258"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/tags?post=26258"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}