menu
Weekly Online Magazine
ISSN 2544-5839
zamknij
Media Review

11.03.2024 Law in media

Quishing. How to Protect Yourself from QR Code Scams

Krzysztof Fiedorek

According to analysts from Keepnet Labs, quishing will be one of the most serious threats to businesses and individuals in 2024. In 2023, the number of data or money theft cases using this method increased globally by 587%.

Poczytaj artykuł wydanie polskie w wydaniu polskim

Quishing: How to Protect Yourself from QR Code Scamsillustration: bing.com/create

In an age of ubiquitous QR codes, cybercriminals have devised a new way to deceive internet users - quishing. This type of attack uses QR codes to redirect users to fake websites, where personal data may be stolen or devices infected with malware.

How Does Quishing Work?


Criminals generate QR codes that look identical to real ones. They then place these codes in public places, such as sidewalks, lamp posts, or bulletin boards, or send them in emails or SMS messages. These codes may lead to fake banking sites, social media portals, reward pages, or other popular services.

After scanning the QR code, the user is redirected to a page that looks identical to the original. Scammers often use social engineering techniques to persuade victims to provide login details, credit card numbers, or other confidential information.

What Are the Threats Associated with Quishing?


As reported recently by Bankier.pl, there are no official statistics on quishing attacks in Poland. However, the threat is rising, as evidenced by warnings from the Ministry of Digitization, the Financial Supervision Authority, and CERT. A new vector of attack includes counterfeit QR code stickers on parking meters.

SELF PROMOTION. Got a minute? Find out our #59sec REPORT on Youtube

According to analysts at Keepnet Labs, quishing will be one of the most serious threats to businesses and individuals in 2024. In 2023, the number of data or money theft cases using this method increased globally by 587%.

Quishing can lead to serious consequences for victims, including:

  • Theft of personal data: Scammers may use victims` personal information for identity theft, financial fraud, or other crimes.
  • Financial loss: Victims may lose money from their bank accounts or credit cards.
  • Device infection with malware: Fake websites may contain malware that can damage devices or steal data.
  • Loss of reputation: In cases of identity theft, victims may have difficulties obtaining credit or employment.

How to Protect Yourself from Quishing?


To protect yourself from quishing, exercise caution when scanning QR codes:

  • Never scan QR codes from unknown sources: Do not scan QR codes placed in public locations or received in emails or SMS from unknown senders.
  • Carefully check the QR code: Before scanning, closely inspect the QR code. Look for any spelling errors or discrepancies in the URL.
  • Use a QR code scanning app with authenticity checking: Some apps can verify whether a QR code is authentic.

Never provide personal data on websites after scanning a QR code, even if the site looks identical to the original. Also, remember to regularly update your antivirus software.

Share the article:

dodaj na Facebook prześlij przez Messenger dodaj na Twitter dodaj na LinkedIn

COMMERCIAL BREAK
Work In Media

New articles in section Law in media

SEO Poisoning. Hackers Use Search Engines to Target Businesses

Piotr Rozmiarek
Search engines help us quickly find information, but they can also be used by cybercriminals. SEO poisoning is a tactic where attackers manipulate search engine rankings to place harmful websites at the top of search results.

Phishing in the Cryptocurrency Industry. Fake Recruitments Steal Data

Piotr Rozmiarek
Security researchers have detected a social engineering campaign targeting job seekers in the Web3 industry. The attack aims to conduct fake job interviews via a meeting application that installs information-stealing malware.

SLAPP Lawsuits in Europe. How Journalists and Activists Are Silenced

Krzysztof Fiedorek
The number of strategic lawsuits aimed at intimidating journalists, activists, and civil society organizations is increasing in Europe. According to the CASE SLAPPs Report 2024, as many as 1,049 such cases were identified between 2010 and 2023.


See articles on a similar topic:

Recognizing Fake News. Technologies for Creating False Information

BARD
Artificial intelligence is increasingly used to fake information. Software now allows manipulation of public appearances by politicians. Bots are also used more often in Poland, with hate speech and trolling among the internet’s biggest threats.

Deepfake. A Powerful New Weapon in The Information War

Krzysztof Fiedorek
One of the newest threats to the credibility of information is deepfake technology. Deepfake is a type of false video or audio material where the person in the recording appears to speak or behave in a way that does not align with reality.

Big Data in Poland. Companies Lack Ideas for Data Utilization

KF
Only 11 to 16 percent of domestic companies report using Big Data solutions, according to a survey by OVH and Intel. Among companies that have not yet used Big Data, only 2 percent plan to adopt this technology this year. Meanwhile, nearly all large and small companies admit to collecting customer data.

How #MeToo Changed Journalism. Report by Reporters Without Borders

Krzysztof Fiedorek
The #MeToo movement has turned the media world upside down, creating new spaces to fight for women’s rights and confronting journalists with challenges they hadn’t previously faced. From new editorial roles to increasing cyberbullying threats, journalism is undergoing a revolution, and feminist media is gaining strength to openly address violence and discrimination.

More in the section: Law in media

community

Facebook LinkedIn X Twitter TikTok Instagram Threads Youtube Google News Blue Sky Social RSS

Reporterzy.info - online media studies magazine. The world of communication from the inside. Media, journalism, PR and marketing. Data, reports, analyses, advice. History and market, law, photography, job offers.


Work in media

United States
New York • Washington DC • Los Angeles • Chicago • Houston • Phoenix • Philadelphia United Kingdom
London • Birmingham • Manchester • Liverpool • Glasgow • Edinburgh Canada
Toronto • Ottawa • Montreal • Calgary Australia
Sydney • Melbourne • Brisbane • canberra Ireland, New Zealand, India

advertisement

Media Review 24/7





Reporter shopping

Reporter shopping

Affordable laptops, notebooks and netbooks
Affordable laptops, notebooks and netbooks
for writing
Digital SLR and compact cameras
Digital SLR and compact cameras
for photographers
Books and e-books about media
Books and e-books about media
for reading
Video drones and flying cameras
Video drones and flying cameras
for pilots
Gimbals for stabilizing video
Gimbals for stabilizing video
for those on the move
Software and apps for creative work
Software and apps for creative work
for digital creators
More occasions

advertisementMedia Review 24/7
Read books and e-books

Read books and e-books

Okładka Understanding Media: The Extensions of Man
Understanding Media: The Extensions of Man
Okładka Media Control. The Spectacular Achievements of Propaganda
Media Control. The Spectacular Achievements of Propaganda
Okładka Mass Communication: Living in a Media World
Mass Communication: Living in a Media World
Okładka Beyond The Feed: A Social Media Success Formula
Beyond The Feed: A Social Media Success Formula
Okładka Trust Me, I`m Lying: Confessions of a Media Manipulator
Trust Me, I`m Lying: Confessions of a Media Manipulator
Okładka Hate, Inc.: Why Today`s Media Makes Us Despise One Another
Hate, Inc.: Why Today`s Media Makes Us Despise One Another
more books and e-books

Reporterzy.info

More about us

Our tools and services

Contact


© Dwornik.pl Bartłomiej Dwornik 2oo1-2o25