logo
Scan or Scam? Kaspersky experts warn of the risks hidden behind QR codes

Scan or Scam? Kaspersky experts warn of the risks hidden behind QR codes

Biz Bahraina day ago
In today's digital world, QR codes are placed on almost everything – from yogurt containers and restaurant menus to museum exhibits, and even utility bills and parking lots. People use them to open websites, download apps, collect loyalty program points, make payments and transfer money, and even for charity donations. The accessible and practical technology is convenient for many, including cybercriminals, who have already rolled out a variety of QR-based schemes. Kaspersky experts have identified the top security risks when scanning QR codes: • Phishing and redirection to malicious sites: QR codes can direct users to fraudulent websites designed to steal personal or financial information, such as passwords and credit card numbers. Attackers can impersonate legitimate sites, such as banks or streaming services, and trick users into entering their credentials. • Malware download: Some QR codes can trigger the download of malicious applications that compromise the security of the user's device, especially if it is not protected against unauthorized installation. • Payment fraud: During special events or sales periods like holiday sales, a fake QR code can redirect users to make payments to fraudulent accounts. • Unsafe automatic connections: A QR code can also automatically connect the user to Wi-Fi networks controlled by cyber attackers, allowing them to intercept their communications. 'QR codes are a fertile ground for potential manipulation, especially as they appear in various everyday contexts such as receipts, flyers, and signage. Attackers have nearly endless possibilities to exploit them. As these codes have already become an integral part of our daily lives, it is essential for users to know how to use them safely and responsibly,' says Seifallah Jedidi, Head of Consumer Channel for META at Kaspersky. In order to not fall for a scam when scanning a QR code, Kaspersky experts recommend: • Verify the source: Scan QR codes only from trusted and known sources. Avoid scanning codes in public places that may have been tampered with. • Check the URL: If you really need to scan a publicly available code, verify that the web address it directed you to is legitimate before taking any action on this website. • Don't share personal information: Avoid entering sensitive information if you're not completely sure of the origin of the QR code.
• Protect your digital life: Install a cybersecurity solution with anti-phishing and anti-fraud protection, such as Kaspersky Premium, on all your devices; it will alert you to any danger timely.
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Scan or Scam? Kaspersky experts warn of the risks hidden behind QR codes
Scan or Scam? Kaspersky experts warn of the risks hidden behind QR codes

Biz Bahrain

timea day ago

  • Biz Bahrain

Scan or Scam? Kaspersky experts warn of the risks hidden behind QR codes

In today's digital world, QR codes are placed on almost everything – from yogurt containers and restaurant menus to museum exhibits, and even utility bills and parking lots. People use them to open websites, download apps, collect loyalty program points, make payments and transfer money, and even for charity donations. The accessible and practical technology is convenient for many, including cybercriminals, who have already rolled out a variety of QR-based schemes. Kaspersky experts have identified the top security risks when scanning QR codes: • Phishing and redirection to malicious sites: QR codes can direct users to fraudulent websites designed to steal personal or financial information, such as passwords and credit card numbers. Attackers can impersonate legitimate sites, such as banks or streaming services, and trick users into entering their credentials. • Malware download: Some QR codes can trigger the download of malicious applications that compromise the security of the user's device, especially if it is not protected against unauthorized installation. • Payment fraud: During special events or sales periods like holiday sales, a fake QR code can redirect users to make payments to fraudulent accounts. • Unsafe automatic connections: A QR code can also automatically connect the user to Wi-Fi networks controlled by cyber attackers, allowing them to intercept their communications. 'QR codes are a fertile ground for potential manipulation, especially as they appear in various everyday contexts such as receipts, flyers, and signage. Attackers have nearly endless possibilities to exploit them. As these codes have already become an integral part of our daily lives, it is essential for users to know how to use them safely and responsibly,' says Seifallah Jedidi, Head of Consumer Channel for META at Kaspersky. In order to not fall for a scam when scanning a QR code, Kaspersky experts recommend: • Verify the source: Scan QR codes only from trusted and known sources. Avoid scanning codes in public places that may have been tampered with. • Check the URL: If you really need to scan a publicly available code, verify that the web address it directed you to is legitimate before taking any action on this website. • Don't share personal information: Avoid entering sensitive information if you're not completely sure of the origin of the QR code. • Protect your digital life: Install a cybersecurity solution with anti-phishing and anti-fraud protection, such as Kaspersky Premium, on all your devices; it will alert you to any danger timely.

Mark Zuckerberg Announces the End of Mobile Phones
Mark Zuckerberg Announces the End of Mobile Phones

Gulf Insider

timea day ago

  • Gulf Insider

Mark Zuckerberg Announces the End of Mobile Phones

For nearly thirty years, we've lived with our faces glued to small screens—thumbs incessantly swiping, notifications pinging at all hours. But according to Mark Zuckerberg, that era may soon be in the rear-view mirror. In a recent interview, the Meta CEO predicted that wearable computing will eclipse smartphones as our primary portal to the digital world. 'People want computing to be more natural and social,' he explained, 'so you can interact with the people around you—this will likely be the next major platform after phones.' I'll admit, I was sceptical at first. Last Christmas, I gifted my partner a sleek new handset—only to watch her tuck it into her bag for the entire family walk. There's no denying we crave convenience, but could we really trade our devices for something we wear over our eyes? The idea of strapping a pair of high-tech spectacles to your face once belonged in sci-fi novels. Yet huge investments by Meta and Apple—whose Vision Pro received rapturous initial reviews—suggest this is more than a passing fad. These next-gen glasses promise augmented reality (AR) overlays, real-time data streams and hands-free navigation, effectively turning your surroundings into an immersive interface.³ Zuckerberg is so confident that he forecasts a full smartphone phase-out by the 2030s. He imagines a day when your phone spends more time tucked away in your pocket than lighting up your palm. Early adopters are already experimenting with prototypes. In San Francisco cafés, professionals dictate messages through voice commands on their frames, and travellers use built-in maps to navigate busy terminals without glancing down at a screen. As these devices slim down and battery lives improve, the line between gadget and accessory will blur even further. Whether you're ready to embrace your new set of specs or simply curious about what's next, one thing's clear: the smartphone's days as our go-to gadget may be numbered. And as Zuckerberg says, 'The real magic happens when technology fades into the background—let the world become your screen.' Also read: What The World Is Asking ChatGPT In 2025

Kaspersky highlights top risks of Quantum Computing
Kaspersky highlights top risks of Quantum Computing

Biz Bahrain

time2 days ago

  • Biz Bahrain

Kaspersky highlights top risks of Quantum Computing

Kaspersky is addressing one of the most debatable technological challenges of the coming decade: the rise of quantum computing and its potential impact on digital security. In this context, experts have identified the main quantum threats that demand immediate action from the cybersecurity community. As classical computers approach their physical limits, their performance growth is slowing — constraining progress in areas that depend on complex computation. At the same time, quantum computers, offering the potential to solve specific problems far faster than classical systems. For now, however, their practical use remains limited to narrow and experimental domains. Nevertheless, experts estimate that we may see a fully fault-tolerant quantum computer within the next decade — a development that could unlock significant advances, but also unleash a new era of cybersecurity threats. Supporting this urgency, Deloitte's 2024 Global Future of Cyber Survey reports that 83% of organizations are already assessing or taking steps to address quantum computing risks, demonstrating growing awareness and proactive strategies in the private sector. To better understand the scope of the evolving threat, Kaspersky has identified three of the most urgent quantum-related risks that demand action from the cybersecurity community: The top three risks Quantum computers could be used to compromise the traditional encryption methods that currently protect data in countless digital systems — posing a direct threat to global cybersecurity infrastructures. Threats include the interception and decoding of sensitive diplomatic, military, and financial communications, as well as the real-time decryption of private negotiations – something quantum systems could handle much faster than classical machines, turning secure conversations into open books. 1. Store now, decrypt later: the key threat of the coming years Threat actors are already harvesting encrypted data today, with the intention of decrypting it in the future once quantum capabilities advance. This 'store now, decrypt later' tactic could expose sensitive information years after it was originally transmitted — including diplomatic exchanges, financial transactions, and private communications. 2. Sabotage in blockchain and cryptocurrency Blockchain networks are not immune to quantum threats. Bitcoin's Elliptic Curve Digital Signature Algorithm (ECDSA), which relies on elliptic curve cryptography (ECC), is especially vulnerable. Potential risks include forging digital signatures, which threatens Bitcoin, Ethereum, and other cryptocurrencies; attacks on ECDSA that secure crypto wallets; and tampering with blockchain transaction history, undermining trust and integrity. 3. Quantum-resistant ransomware: a new front Looking ahead, developers and operators of advanced ransomware may begin adopting post-quantum cryptography to protect their own malicious payloads. So-called 'quantum-resistant' ransomware would be designed to resist decryption by both classical and quantum computers — potentially making recovery without paying a ransom nearly impossible. At present, quantum computing does not offer a way to decrypt files locked by current ransomware. Data protection and recovery still rely on traditional security solutions and collaboration among law enforcement agencies, quantum researchers, and international organizations. Building quantum-safe defenses Quantum computers are not yet a direct threat — but by the time they are, it may be too late to respond. Transitioning to post-quantum cryptography will take years. Preparations must begin today. The cybersecurity community, IT companies, and governments must coordinate to address the risks ahead. Policymakers should develop clear strategies to migrate to post-quantum algorithms. Businesses and researchers need to begin implementing new security standards now. 'The most critical risk lies not really in the future, but in the present: encrypted data with long-term value is already at risk from future decryption. The security decisions we make today will define the resilience of our digital infrastructure for decades. Governments, businesses, and infrastructure providers must begin adapting now, or risk systemic vulnerabilities that cannot be retroactively fixed', states Sergey Lozhkin, Head of Kaspersky Global Research & Analysis Team for META and APAC.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store