PhishingBox Logo
Banner

What You'll Learn Today:

QR Code Scam Safety

Cybercriminals deploy malicious QR codes physically and digitally.

To Scan or Not to Scan?

Inspect physical QR codes before scanning them with your camera or smart device application

  • Restaurant menus, payment kiosks, entry locations, and more uses now heavily use QR codes
  • This large-scale technology adoption has led to cybercriminals creating fake QR code stickers or covers to scam unsuspecting targets
  • Check for stickers or other application layers over the original material before scanning and go direct to a website destination when possible

Treat digital QR codes as potential hyperlink cyber threats

  • Checking the destination link of a QR code before entering a site is considered best practice
  • Never share or forward an email containing a QR code within the design or as an attachment without first ensuring the destination is legitimate and secure
  • Use devices with additional security tools that check sites for potentially malicious behavior when possible

Question Icon

Inspect physical QR codes before scanning them with your camera or smart device application

  • Restaurant menus, payment kiosks, entry locations, and more uses now heavily use QR codes
  • This large-scale technology adoption has led to cybercriminals creating fake QR code stickers or covers to scam unsuspecting targets
  • Check for stickers or other application layers over the original material before scanning and go direct to a website destination when possible

Question Icon

Treat digital QR codes as potential hyperlink cyber threats

  • Checking the destination link of a QR code before entering a site is considered best practice
  • Never share or forward an email containing a QR code within the design or as an attachment without first ensuring the destination is legitimate and secure
  • Use devices with additional security tools that check sites for potentially malicious behavior when possible

QR codes have grown in popularity and are now integrated with our day-to-day routines. As with any widely used technology, caution and confirmation can mitigate potential problems.

Copyright © PhishingBox