{"id":5991,"date":"2021-10-28T12:46:59","date_gmt":"2021-10-28T10:46:59","guid":{"rendered":"https:\/\/www.esferize.com\/qr-codes-a-cybersecurity-threat\/"},"modified":"2021-10-28T12:46:59","modified_gmt":"2021-10-28T10:46:59","slug":"qr-codes-a-cybersecurity-threat","status":"publish","type":"post","link":"https:\/\/www.esferize.com\/en\/qr-codes-a-cybersecurity-threat\/","title":{"rendered":"QR codes: a cybersecurity threat"},"content":{"rendered":"<p class=\"paragraph\">In the crisis, technology became one of the most important tools, as the use of mobile devices grew exponentially thanks to their useful functions. Applications such as <strong>Zoom, Google Meet and Microsoft Teams<\/strong> were the &#8220;salvation&#8221; of companies and educational institutions that were able to continue their activities in the midst of enforced isolation.<\/p>\n<p class=\"paragraph\">However, none of these apps would have been what they were without two fundamental tools: <strong>the camera and the Internet<\/strong>. With these two supports, even the simplest software can take centre stage. Just as <strong>QR codes<\/strong> have been in the last year and a half.<\/p>\n<p class=\"paragraph\">This little box filled with black and white shapes is one of the technological options that has been used the most during the gradual economic revival. Considering that it fulfils one of the most important requirements of any pandemic: <strong>social distancing<\/strong>.<\/p>\n<p class=\"paragraph\">With QR, for example, it was no longer necessary to print out menus for a restaurant. Now all you need to do is <strong>take out your smartphone and scan the corresponding code<\/strong>; a simple way to take care of your health and, of course, the environment.<\/p>\n<p class=\"paragraph\">As <a href=\"https:\/\/www.beyondtrust.com\">BeyondTrust<\/a> put it in a press release, &#8220;<strong>this useful tool has become a quick and easy way to steal user information and commit cybercrime<\/strong>. Once scanned, it runs the risk of implanting spyware or malware that can compromise a person&#8217;s identity&#8221;.<\/p>\n<h2 class=\"header\">Dangers on smartphones<\/h2>\n<blockquote>\n<p class=\"paragraph\">&#8220;Scanning a QR code automatically uploads or initiates a phone call to a predefined number. With all the recent robocall and SIM Jacking attacks. <strong>This is another method for someone to gain access, without your permission, to your phone and identity<\/strong>. Basically, you are calling someone you don&#8217;t know and handing over your caller ID information.&#8221;<\/p>\n<\/blockquote>\n<p class=\"paragraph\">In this way, you can also become a victim of <a href=\"https:\/\/www.esferize.com\/en\/what-is-phishing-how-does-it-work-and-how-to-protect-yourself\/\"><strong>phishing<\/strong><\/a>, falling into a fraud that can result in the partial or total loss of money held in a bank account.<\/p>\n<h2 class=\"header\">Danger on the web<\/h2>\n<p class=\"paragraph\">A QR, for the most part, redirects to websites that, in many cases, could be considered untrustworthy. The content within these websites could be harmful to people&#8217;s private information. Either by <strong>malware or other unwanted content directly attacking their data<\/strong>. Or gradually becoming a threat to them.<\/p>\n<h2 class=\"header\">Danger on a PlayStore<\/h2>\n<blockquote>\n<p class=\"paragraph\">&#8220;Scanning links to a page directly in an app shop can make an app easy to download. <strong>While this is convenient, the listing could be malicious (especially on Android devices). Or it could be a fake page that uses an embedded URL to trick you into loading an unauthorised malicious app<\/strong>. The best option is to always navigate to an app yourself and not rely on a direct link.&#8221;<\/p>\n<\/blockquote>\n<p class=\"paragraph\">We recommend that if you ever see a QR code on a wall, building, computer screen or even a business card outside your home, do not scan it. <strong>A cybercriminal can easily paste their malicious QR code on paper over a real one<\/strong>, create an imitation and you won&#8217;t be able to tell if the content is safe or malicious.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the crisis, technology became one of the most important  [&#8230;]<\/p>\n","protected":false},"author":8,"featured_media":5990,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[225,228],"tags":[877,232,876,874,873,878,795,875],"class_list":["post-5991","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-security-on-the-internet","tag-app-store-en","tag-cybersecurity","tag-playstore-en","tag-qr-en","tag-qr-code","tag-qr-dangers","tag-risks","tag-threat"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>QR codes: a cybersecurity threat - Esferize<\/title>\n<meta name=\"description\" content=\"The pandemic has led to the widespread use of QR codes, a cybersecurity threat exploited by cybercriminals.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esferize.com\/en\/qr-codes-a-cybersecurity-threat\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"QR codes: a cybersecurity threat - Esferize\" \/>\n<meta property=\"og:description\" content=\"The pandemic has led to the widespread use of QR codes, a cybersecurity threat exploited by cybercriminals.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esferize.com\/en\/qr-codes-a-cybersecurity-threat\/\" \/>\n<meta property=\"og:site_name\" content=\"Esferize\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-28T10:46:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.esferize.com\/wp-content\/uploads\/2021\/10\/metaball_scan-qr-code-to-get-food-discounts-or-pay-for-food-through-stores.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"717\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Cynthia Soto del R\u00edo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Cynthia Soto del R\u00edo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/qr-codes-a-cybersecurity-threat\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/qr-codes-a-cybersecurity-threat\\\/\"},\"author\":{\"name\":\"Cynthia Soto del R\u00edo\",\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/#\\\/schema\\\/person\\\/6dd1aa318242d5cd1a6c357008503d2b\"},\"headline\":\"QR codes: a cybersecurity threat\",\"datePublished\":\"2021-10-28T10:46:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/qr-codes-a-cybersecurity-threat\\\/\"},\"wordCount\":507,\"publisher\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/qr-codes-a-cybersecurity-threat\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.esferize.com\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/metaball_scan-qr-code-to-get-food-discounts-or-pay-for-food-through-stores.png\",\"keywords\":[\"app store\",\"cybersecurity\",\"playstore\",\"QR\",\"qr code\",\"QR dangers\",\"risks\",\"threat\"],\"articleSection\":[\"Cybersecurity\",\"Security on the Internet\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/qr-codes-a-cybersecurity-threat\\\/\",\"url\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/qr-codes-a-cybersecurity-threat\\\/\",\"name\":\"QR codes: a cybersecurity threat - Esferize\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/qr-codes-a-cybersecurity-threat\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/qr-codes-a-cybersecurity-threat\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.esferize.com\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/metaball_scan-qr-code-to-get-food-discounts-or-pay-for-food-through-stores.png\",\"datePublished\":\"2021-10-28T10:46:59+00:00\",\"description\":\"The pandemic has led to the widespread use of QR codes, a cybersecurity threat exploited by cybercriminals.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/qr-codes-a-cybersecurity-threat\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.esferize.com\\\/en\\\/qr-codes-a-cybersecurity-threat\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/qr-codes-a-cybersecurity-threat\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.esferize.com\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/metaball_scan-qr-code-to-get-food-discounts-or-pay-for-food-through-stores.png\",\"contentUrl\":\"https:\\\/\\\/www.esferize.com\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/metaball_scan-qr-code-to-get-food-discounts-or-pay-for-food-through-stores.png\",\"width\":1080,\"height\":717,\"caption\":\"C\u00f3digos QR: una amenaza para la ciberseguridad\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/qr-codes-a-cybersecurity-threat\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"QR codes: a cybersecurity threat\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/\",\"name\":\"Esferize\",\"description\":\"Connect to the future\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/#organization\",\"name\":\"Esferize Comunicaciones S.L.\",\"url\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.esferize.com\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/logo.png\",\"contentUrl\":\"https:\\\/\\\/www.esferize.com\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/logo.png\",\"width\":453,\"height\":100,\"caption\":\"Esferize Comunicaciones S.L.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/esferize-comunicaciones\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/#\\\/schema\\\/person\\\/6dd1aa318242d5cd1a6c357008503d2b\",\"name\":\"Cynthia Soto del R\u00edo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/607023580431f3ebba6044ec2ef49d78d64cacf5aff25a877d4d2cbf80b5dd87?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/607023580431f3ebba6044ec2ef49d78d64cacf5aff25a877d4d2cbf80b5dd87?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/607023580431f3ebba6044ec2ef49d78d64cacf5aff25a877d4d2cbf80b5dd87?s=96&d=mm&r=g\",\"caption\":\"Cynthia Soto del R\u00edo\"},\"url\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/author\\\/csoto\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"QR codes: a cybersecurity threat - Esferize","description":"The pandemic has led to the widespread use of QR codes, a cybersecurity threat exploited by cybercriminals.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esferize.com\/en\/qr-codes-a-cybersecurity-threat\/","og_locale":"en_US","og_type":"article","og_title":"QR codes: a cybersecurity threat - Esferize","og_description":"The pandemic has led to the widespread use of QR codes, a cybersecurity threat exploited by cybercriminals.","og_url":"https:\/\/www.esferize.com\/en\/qr-codes-a-cybersecurity-threat\/","og_site_name":"Esferize","article_published_time":"2021-10-28T10:46:59+00:00","og_image":[{"width":1080,"height":717,"url":"https:\/\/www.esferize.com\/wp-content\/uploads\/2021\/10\/metaball_scan-qr-code-to-get-food-discounts-or-pay-for-food-through-stores.png","type":"image\/png"}],"author":"Cynthia Soto del R\u00edo","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Cynthia Soto del R\u00edo","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esferize.com\/en\/qr-codes-a-cybersecurity-threat\/#article","isPartOf":{"@id":"https:\/\/www.esferize.com\/en\/qr-codes-a-cybersecurity-threat\/"},"author":{"name":"Cynthia Soto del R\u00edo","@id":"https:\/\/www.esferize.com\/en\/#\/schema\/person\/6dd1aa318242d5cd1a6c357008503d2b"},"headline":"QR codes: a cybersecurity threat","datePublished":"2021-10-28T10:46:59+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esferize.com\/en\/qr-codes-a-cybersecurity-threat\/"},"wordCount":507,"publisher":{"@id":"https:\/\/www.esferize.com\/en\/#organization"},"image":{"@id":"https:\/\/www.esferize.com\/en\/qr-codes-a-cybersecurity-threat\/#primaryimage"},"thumbnailUrl":"https:\/\/www.esferize.com\/wp-content\/uploads\/2021\/10\/metaball_scan-qr-code-to-get-food-discounts-or-pay-for-food-through-stores.png","keywords":["app store","cybersecurity","playstore","QR","qr code","QR dangers","risks","threat"],"articleSection":["Cybersecurity","Security on the Internet"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esferize.com\/en\/qr-codes-a-cybersecurity-threat\/","url":"https:\/\/www.esferize.com\/en\/qr-codes-a-cybersecurity-threat\/","name":"QR codes: a cybersecurity threat - Esferize","isPartOf":{"@id":"https:\/\/www.esferize.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esferize.com\/en\/qr-codes-a-cybersecurity-threat\/#primaryimage"},"image":{"@id":"https:\/\/www.esferize.com\/en\/qr-codes-a-cybersecurity-threat\/#primaryimage"},"thumbnailUrl":"https:\/\/www.esferize.com\/wp-content\/uploads\/2021\/10\/metaball_scan-qr-code-to-get-food-discounts-or-pay-for-food-through-stores.png","datePublished":"2021-10-28T10:46:59+00:00","description":"The pandemic has led to the widespread use of QR codes, a cybersecurity threat exploited by cybercriminals.","breadcrumb":{"@id":"https:\/\/www.esferize.com\/en\/qr-codes-a-cybersecurity-threat\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esferize.com\/en\/qr-codes-a-cybersecurity-threat\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esferize.com\/en\/qr-codes-a-cybersecurity-threat\/#primaryimage","url":"https:\/\/www.esferize.com\/wp-content\/uploads\/2021\/10\/metaball_scan-qr-code-to-get-food-discounts-or-pay-for-food-through-stores.png","contentUrl":"https:\/\/www.esferize.com\/wp-content\/uploads\/2021\/10\/metaball_scan-qr-code-to-get-food-discounts-or-pay-for-food-through-stores.png","width":1080,"height":717,"caption":"C\u00f3digos QR: una amenaza para la ciberseguridad"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esferize.com\/en\/qr-codes-a-cybersecurity-threat\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.esferize.com\/en\/"},{"@type":"ListItem","position":2,"name":"QR codes: a cybersecurity threat"}]},{"@type":"WebSite","@id":"https:\/\/www.esferize.com\/en\/#website","url":"https:\/\/www.esferize.com\/en\/","name":"Esferize","description":"Connect to the future","publisher":{"@id":"https:\/\/www.esferize.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esferize.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esferize.com\/en\/#organization","name":"Esferize Comunicaciones S.L.","url":"https:\/\/www.esferize.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esferize.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.esferize.com\/wp-content\/uploads\/2019\/10\/logo.png","contentUrl":"https:\/\/www.esferize.com\/wp-content\/uploads\/2019\/10\/logo.png","width":453,"height":100,"caption":"Esferize Comunicaciones S.L."},"image":{"@id":"https:\/\/www.esferize.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/esferize-comunicaciones"]},{"@type":"Person","@id":"https:\/\/www.esferize.com\/en\/#\/schema\/person\/6dd1aa318242d5cd1a6c357008503d2b","name":"Cynthia Soto del R\u00edo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/607023580431f3ebba6044ec2ef49d78d64cacf5aff25a877d4d2cbf80b5dd87?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/607023580431f3ebba6044ec2ef49d78d64cacf5aff25a877d4d2cbf80b5dd87?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/607023580431f3ebba6044ec2ef49d78d64cacf5aff25a877d4d2cbf80b5dd87?s=96&d=mm&r=g","caption":"Cynthia Soto del R\u00edo"},"url":"https:\/\/www.esferize.com\/en\/author\/csoto\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/posts\/5991","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/comments?post=5991"}],"version-history":[{"count":0,"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/posts\/5991\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/media\/5990"}],"wp:attachment":[{"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/media?parent=5991"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/categories?post=5991"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/tags?post=5991"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}