- 28 June 2011 15:08
AVG (AU/NZ) Cautions: Beware of Malicious QR Codes
AVG (AU/NZ) Pty Ltd, the distributor of the award-winning AVG anti-virus and Internet security software in Australia, New Zealand and South Pacific, has warned of the potential dangers to business and consumer users of smartphones and tablets being posed by their use of QR codes.
QR (Quick Response) codes, and similar mobile tagging formats, can be targeted and manipulated by cyber criminals to easily steer victims to malicious web sites in a new avenue to steal identities and commit fraud.
The matrix style, geometric barcodes can be seen in magazines, on billboards, street posters, buses and merchandise, and are providing highly convenient access to information, incentives and special deals.
But malicious QR codes can be easily generated and placed as stickers over the legitimate QR codes for both small and large-scale attacks on personal and financial identity. Printed flyers offering irresistible deals, but accessible only via a QR code, could easily be left in public places.
By such simple means, cyber criminals, skilled at using sophisticated attacks like spear phishing or other variants of social engineering, can then use their own malicious QR code to phish or pharm the unsuspecting smartphone user to a web page designed to look as though it is a legitimate advertiser. The cyber criminals will have their own web form with instructions on how to sign-up for a service or competition, or purchase some bargain. By completing the form victims provide them with private details and/or money.
Using other less subtle tricks, the bad guys can direct browser users to malicious web pages and install malware on their mobile device.
Lloyd Borrett, Security Evangelist of AVG (AU/NZ) has a very clear message for users of smartphones, or any other mobile computer device with in-built cameras: “You must think of your device as the being the powerful mobile computer it is. Take similar security precautions when out and about with your smartphone or tablet as you do when using a personal computer at home or work. Have always on, up-to-date security software installed on your device. And, always think through every action before you click on a bargain.”
Tips for Quick Response Safety
• Never implicitly trust any QR code. Be suspicious and alert when you go to use it.
• Make sure you have security software installed on your mobile device. The vast majority of smartphone, tablet and e-reader users currently do not have any security software installed. Yet these devices can be even more susceptible to malicious attacks by cyber criminals. Free and paid security software solutions, like AVG Mobilation for Android, are available for most device platforms.
• If QR code takes you to a web page which asks you to provide your user name, password, bank account details, and/or credit card details, then the person behind the web page is either a thief or an idiot! So don't provide those details to them.
• If a QR code takes you to a web page where you need to login, then don’t login. Instead, go directly to the web page by putting the correct URL into your browser address bar, or via some other trusted means. Doing this means you are much less likely to fall victim to a phishing scam.
“Our surveys show that the majority of people aren’t even password protecting their smartphone and tablet devices,” said Borrett. “Yet they need to be doing much more, including installing a good security solution like AVG Mobilation for Android. Then they will have protection in place that will check apps and web site content for malware should they be tricked into using a malicious QR code.”
About QR Codes
The QR codes are a specific, two dimensional, black on white square matrix barcode that are readable by devices such as smartphones. The encoded information, in text, URL or other data format, can be up to 7,089 characters as opposed to the 20 character limit of a standard barcode.
Although initially used for tracking parts in vehicle manufacturing by Toyota subsidiary Denso-Wave, QR codes are now used in a much broader context, including both commercial tracking applications and convenience-oriented applications aimed at mobile phone users — termed mobile tagging.
QR codes can be used to display text to the user, to add a vCard contact to the user's device, to open a Uniform Resource Identifier (URI), or to compose an email or text message. Users can also generate and print their own QR codes for others to scan and use by visiting one of several free QR code generating sites.
Users with a camera phone equipped with the correct reader application can scan the image of the QR code to display text, contact information, connect to a wireless network, or open a web page in the smartphone's browser. This act of linking from physical world objects is termed hardlinking or object hyperlinking.
“Please be warned that QR codes aren't the only mobile tagging code format in use,” Borrett added. “There are a number of other proprietary and non-proprietary, optically readable codes around. For most of them the same security concerns and safety warnings apply. So please play it safe when using all of them.”
AVG (AU/NZ) has a comprehensive range of security tips on its web site at http://www.avg.com.au/resources/security-tips/. For video tips from AVG (AU/NZ), see http://www.youtube.com/user/avgaunz.
Keep in touch with AVG (AU/NZ) • For breaking news, follow AVG (AU/NZ) on Twitter at www.twitter.com/avgau • Join our Facebook community at www.facebook.com/avgaunz
### ENDS ###
About AVG (AU/NZ) Pty Ltd — www.avg.com.au
Based in Melbourne, AVG (AU/NZ) Pty Ltd distributes the AVG range of anti-virus and Internet Security products in Australia, New Zealand and the South Pacific. AVG software solutions provide complete real-time protection against the malware, viruses, spam, spyware, adware, worms, Trojans, phishing and exploits used by cyber-criminals, hackers, scammers and identity thieves. AVG protects everything important and personal inside computers — documents, account details and passwords, music, photos and more — all while allowing users to work, bank, shop and play games online in safety. AVG provides outstanding technical solutions and exceptional value for consumers, small to medium business and enterprise clients. AVG delivers always-on, always up-to-date protection across desktop, and notebook PCs, plus file and e-mail servers in the home and at work in SMBs, corporations, government agencies and educational institutions.
Talk to Us
Lloyd Borrett AVG (AU/NZ) 03 9581 0807
Shuna Boyd BoydPR 02 9418 8100
Media resources, including logos, box shots, screen shots etc., are available online at: http://www.avg.com.au/media/
Join the AVG Community for information, video content and pictures: http://www.flickr.com/photos/officialavg/sets/
Most Popular Reviews
- 1 Samsung Galaxy Note 7 review
- 2 Portable power: Venom Blackbook 13 Zero review
- 3 Alcatel Idol 4S review: King of the mid-range?
- 4 Witness a 241% Australian price hike: Dell Latitude 7370 review
- 5 Is this the best value phone on the market? Moto G4 Plus review
Join the PC World newsletter!
Latest News Articles
- U.S. convicts Russian hacker in credit card theft scheme
- Apple patches iOS security flaws found in spyware targeting activist
- Informatica CEO: 'Data security is an unsolved problem'
- Here's how the Xbox One S stacks up to the original
- Intel spreads 3D NAND to inexpensive consumer and enterprise SSDs
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- CCData Migration SpecialistSA
- FTIT Manager - Infrastructure Strategy and OperationsNSW
- CCICT Security Design & Implementation - NV1ACT
- FTIT ManagerNSW
- FTTM1 Solution DesignerNSW
- FTUNIX, LINUX , VM System AdministrationNSW
- CCSAP ABAP DeveloperNSW
- CCAnalyst Programmer/Snr. Analyst Programmer 20160817/vedAsia
- FTCapacity PlannerNSW
- CCMurex Developers x 2NSW
- CCSharepoint ArchitectACT
- CCSenior Process Analyst - WealthVIC
- CCSolution Architect - POSVIC
- CCContract Analyst Programmer (IT Application/Web) 160825/AP/183Asia
- CCQuality AnalystNSW
- CCContract Systems Analyst (.Net/SQL Server) 160829/SA/244Asia
- CCSAP ArchitectSA
- FTSAP FI/CO module- Tester/ Quality AnalystNSW
- CCWeb Content SpecialistNSW
- CCSenior Manager - Infrastructure Supply ChainNSW
- CCSenior Integration Specialist - IP NetworkVIC
- CCSr. Project Manager- Infrastructure- Data Centre,VirtualizationNSW
- FTData AnalystsWA
- CCProject ManagerVIC
- CCContract Programmer (JAVA/SQL) 160818/P/265Asia