Mon, 8 Aug 2022
22.7 C

QR codes: think before you scan

Home Business Management QR codes: think before you scan

By Simeon Tassev

QR codes are nothing new. They have been around since 2004. But with the increased availability of smartphones, which can scan these two-dimensional barcodes with their built-in cameras, QR codes have become increasingly popular.

They can be used to make payments, download menus in restaurants, for general marketing purposes and a multitude of other applications. They can also be used by cybercriminals and malicious actors to steal personal and payment-related information, so it pays to be a little more aware.

QR codes are, by design, incredibly user-friendly. These days, we see them everywhere. They are on the back of consumer products, and we can scan them to get more information. They are in restaurants so we can scan them to view the menu without touching a physical menu card. They are used to enter competitions, in children’s books to access online content. They are also used by various apps to allow small business vendors to accept credit card payments.

The risk is that, while smartphones can read the QR code, humans cannot, so we have no idea where the code will direct us to. We could easily be clicking on an infected link, a spoof website, or even just paying the wrong vendor. Opening a QR code could trigger an executable file or potentially malicious code, which can then be used by cybercriminals to steal personal information, including payment data.

The issue here is not with the QR codes themselves, or with the payment apps, because these are both secure and mature technologies. The trouble is that QR codes are easy to generate – this can be done for free online – which means that genuine codes can easily be replaced by fake ones, leading people to links that look legitimate, or that are legitimate but send payment to the wrong vendor.


For example, at a market, vendors will have QR codes to scan and pay, but they often have strange names, or multiple businesses use the same payment application code. This makes it very easy for a malicious actor to replace the real code with their own, effectively stealing money from these vendors.

Similarly, QR codes for downloading menus, entering competitions or other marketing exercises, can easily be replaced by fake codes that look real, but lead people to infected links or spoof sites where personal information is voluntarily entered and then stolen.

The biggest risk around QR codes is that we use them in scenarios where we are not necessarily paying attention to, or thinking about, cybersecurity. They are easy and convenient, and even children can use them. However, they can also be abused, so we need to be aware of the risk.

If possible, verify the payment before you process it – check with the vendor that you are paying the right person, visit links directly through your browser, or use an alternate method where possible. Have endpoint security on your devices to protect you from malicious content. Most of all, be mindful. QR codes are fun, easy and convenient, but they are vulnerable to abuse, and we need to be aware. You wouldn’t just click a link in an email without checking, so why scan a QR code without verifying it first.

Simeon Tassev is MD and QSA at Galix

Most Popular

WRAS approves Vesconite’s Hitemp 160

High-temperature-resistant bearing material Hitemp 160 has been certified for contact with water up to 65ºC (150ºF). This is according to the maker, Vesconite Bearings, which...

Why telemetry should form a critical part of your water management systems

By Johan Potgieter, software leader: Anglophone Africa at Schneider Electric In a time when the consistent provision of water, hampered by challenges like aging infrastructure,...

Energy efficiency is key to sustainable wastewater infrastructure

With no end in sight for loadshedding, municipalities need to start engaging in energy-efficient mechanisms in their water and wastewater infrastructure. This infrastructure is one...

Videoscopes offer non-invasive diagnostics

WHILE videoscopes are commonly used in many applications, industrial inspections require a powerful, high-resolution videoscope that clearly displays the condition of internal equipment components....