Settings
Language
Color Theme
What is QR-Phishing?
QR phishing (also known as quishing) is when attackers create fake QR codes that lead you somewhere you weren’t expecting. Often, the destination is a malicious website designed to steal your information, download malware, or trick you into taking unsafe actions.
Which of the following best describes what QR-Phishing is?
QR phishing is when attackers use fake QR codes to send you to malicious sites, download and install malware, or steal your information.
View Options Again
A data-sharing protocol that allows QR codes to link directly to secure cloud environments
A government policy for managing QR code use in digital services
A scam where attackers use fake QR codes to steal information or download and install malware
A method used by financial institutions to verify QR code payments through encrypted channels
How to protect yourself from QR-phishing scams
QR codes are everywhere, but that doesn’t mean they’re all safe. That’s why it’s important to check the context, preview the link, type the URL manually if something feels off, and never share sensitive information without a clear reason. Let’s explore these key safety tips in more detail.
Context Matters
Always check the context before scanning a QR code, especially in public places. If it’s randomly placed with no explanation, it could be planted by an attacker. Scanning a QR code without verifying its source or purpose leaves you vulnerable to potential scams.
Check The Link
Before clicking a QR code link, check the URL preview that appears on your screen. Look for spelling errors, odd characters, or anything that feels off. If the link doesn’t match what you expected, don’t tap it.
Why is it risky to scan a QR code placed on a lamp post or public bench?
Public QR codes can be planted by attackers to entice you into interacting with malicious content. If the code looks random or has no clear reason for being there, it could be a scam.
View Options Again
It could affect your phone’s battery life
It could be a scavenger hunt clue
It might redirect you to a malicious site
It might link to an outdated website
Manually Enter The URL
If a QR code seems suspicious, don’t trust it. Where possible, instead of scanning, type the website address directly into your browser. That way, you know exactly where you’re going and are less likely to be tricked by a fake or misleading link.
When scanning a QR code, what should you do before clicking the link?
Always check the link carefully. Fake URLs are designed to look real at first glance, but small differences can lead you to malicious sites and put your information at risk.
View Options Again
Preview and verify the URL
Screenshot it for later
Open it immediately
Forward it to a friend
Protect Your Personal Information
If a QR code immediately asks for personal or financial details, that’s a red flag. Legitimate organizations won’t request sensitive information without proper context, verification, or a secure environment. Always pause and question why the information is being requested before handing it over.
Is the following statement True or False:
It is normal for a QR code to immediately ask for personal or financial information after scanning
Legitimate organizations don’t ask for personal information right after a scan. If a QR code demands sensitive details without context, it’s likely a phishing scam. Always verify before trusting it.
View Options Again
True
False
Why is manually typing in a URL safer than scanning a QR code?
When you type a URL, you know exactly where you're going. With a QR code, you're trusting whoever made it. Attackers can use them to hide fake or dangerous links that look safe but are not.
View Options Again
It helps avoid typos
It makes you look tech-savvy
It prevents your phone from overheating
It lets you control exactly where you go
What QR Codes Are Capable Of
QR codes are powerful shortcuts. They save time, simplify access, and make interactions almost effortless. That convenience can be hijacked. Here are just a few ways attackers can weaponize them.
Malicious Links & Downloads
Pre-Filled Emails & Texts
Fake Wi-Fi & Calendar Invites
One quick scan can take you to a spoofed site that steals your credentials, or trigger a hidden download that installs malware on your device. These attacks often happen silently, leaving you unaware that anything went wrong until it's too late.
Cybercriminals often use digital or physically printed QR codes to embed a smart link, which, when scanned and clicked, automatically detects the victim's operating system and then loads their device's native app store, with a malicious app ready for installation.
QR codes can silently insert events into your calendar or connect your device to an unsecured WiFi network. That “meeting invite” might contain phishing links, and that "free hotspot" could be a setup to intercept your data and monitor activity without your knowledge.
Which of the following could a malicious QR code do?
Cybercriminals use QR codes to embed fake Wi-Fi network configurations, which mobile devices then use to automatically connect to a rogue Wi-Fi network, which in this case is controlled by the attacker, with all data being intercepted.
View Options Again
Connect your device to a fake Wi-Fi network
Increase your download speed
Enable airplane mode for security
Link you to a secure government portal
Which of these is NOT a safe QR code practice?
Scanning QR codes in public bathrooms is unsafe because anyone, including cybercriminals, could have placed those codes there.
View Options Again
Scanning QR codes on official business documents
Typing the URL directly if something feels off
Previewing the link before tapping
Scanning QR codes in public bathrooms
A restaurant QR code stand asks for your credit card information immediately. What should you do?
If a QR code leads to a page asking for credit card information, especially somewhere like a restaurant, it’s a red flag. Legitimate menu links shouldn’t ask for payment up front.
View Options Again
Enter fake details to test it
Use a different browser
Refresh the page
Close the site and alert staff
Risks Beyond Public Spaces
QR codes aren’t just showing up on posters and stickers anymore. Scammers are slipping them into phishing emails, SMS messages, social media posts, and even fake bills sent by post. These codes are used to bypass traditional security filters and catch you off guard in more trusted, private settings.
Which of the following is a non-public way scammers might deliver malicious QR codes?
Scammers can deliver malicious QR codes through SMS messages, email attachments, and fake invoices sent by post. These methods target you in more trusted environments, increasing the chances you'll scan without thinking.
View Options Again
Sending it via SMS message
Including it in an email attachment
Printing it on a fake invoice sent by mail
All of the above
Importance of understanding QR-phishing
QR-phishing is a growing threat that preys on convenience and habit. With QR codes popping up on menus, posters, and invoices, people often scan without a second thought. Slowing down before scanning helps keep cybercriminals out.
The Importance of QR Scam Awareness
Stay vigilant. Always check the context of a QR code before scanning. Preview the link before clicking or better yet, type it in yourself. A few smart habits can stop QR phishing and help keep you one step ahead of scammers.
Back
Next
Translation Correction
×
Select a translation to correct...
Begin the Guided Tour
[0, "Begin the Guided Tour", "Begin the Guided Tour"],
Look out for urgency in email subjects, fraudulent sender addresses or requests to perform an action.
[1, "Look out for urgency in email subjects, fraudulent sender addresses or requests to perform an action.", "Look out for urgency in email subjects, fraudulent sender addresses or requests to perform an action."],
Compose
[2, "Compose", "Compose"],
Folders
[3, "Folders", "Folders"],
Inbox
[4, "Inbox", "Inbox"],
Starred
[5, "Starred", "Starred"],
Draft
[6, "Draft", "Draft"],
Sent Mail
[7, "Sent Mail", "Sent Mail"],
Spam
[8, "Spam", "Spam"],
Trash
[9, "Trash", "Trash"],
[URGENT] Claim Your Work From Home Set-Up Payment
[10, "[URGENT] Claim Your Work From Home Set-Up Payment", "[URGENT] Claim Your Work From Home Set-Up Payment"],
Human Resources
[11, "Human Resources", "Human Resources"],
to
[12, "to", "to"],
Claim Your Work From Home Set-Up Payment
[13, "Claim Your Work From Home Set-Up Payment", "Claim Your Work From Home Set-Up Payment"],
Our company acknowledges that we are all working from home for a longer period and is offering a one-time payment to all employees of
[14, "Our company acknowledges that we are all working from home for a longer period and is offering a one-time payment to all employees of", "Our company acknowledges that we are all working from home for a longer period and is offering a one-time payment to all employees of"],
to ensure that you have a suitable home working set-up.
[15, "to ensure that you have a suitable home working set-up.", "to ensure that you have a suitable home working set-up."],
To receive the payment via payroll
[16, "To receive the payment via payroll", "To receive the payment via payroll"],
you will need to complete this
[17, "you will need to complete this", "you will need to complete this"],
acknowledgement form
[18, "acknowledgement form", "acknowledgement form"],
For more information on how to set up your home office space safely, please look at the
[19, "For more information on how to set up your home office space safely, please look at the", "For more information on how to set up your home office space safely, please look at the"],
Thank you
[20, "Thank you", "Thank you"],
The Human Resources Team
[21, "The Human Resources Team", "The Human Resources Team"],
This is an automatically generated email, please do not reply
[22, "This is an automatically generated email, please do not reply", "This is an automatically generated email, please do not reply"],
Is the following statement True or False
[23, "Is the following statement True or False", "Is the following statement True or False"],
View Options Again
[24, "View Options Again", "View Options Again"],
Email Subject: Urgent Action
[25, "Email Subject: Urgent Action", "Email Subject: Urgent Action"],
Phishing attacks are designed to put a
[26, "Phishing attacks are designed to put a", "Phishing attacks are designed to put a"],
time pressure on us to act fast
[27, "time pressure on us to act fast", "time pressure on us to act fast"],
This can cause us to skip much of the critical thinking we normally apply when browsing our emails
[28, "This can cause us to skip much of the critical thinking we normally apply when browsing our emails", "This can cause us to skip much of the critical thinking we normally apply when browsing our emails"],
Email Sender: Fradulent Address
[29, "Email Sender: Fradulent Address", "Email Sender: Fradulent Address"],
Email Sender: Fraudulent Address
[30, "Email Sender: Fraudulent Address", "Email Sender: Fraudulent Address"],
Attackers will often use
[31, "Attackers will often use", "Attackers will often use"],
obscure email addresses and use display names
[32, "obscure email addresses and use display names", "obscure email addresses and use display names"],
that appear legitimate to the naked eye. Be cautious and carefully inspect email sender information
[33, "that appear legitimate to the naked eye. Be cautious and carefully inspect email sender information", "that appear legitimate to the naked eye. Be cautious and carefully inspect email sender information"],
Email Content: Engaging Topic
[34, "Email Content: Engaging Topic", "Email Content: Engaging Topic"],
Attackers often use a
[35, "Attackers often use a", "Attackers often use a"],
broad but important topic
[36, "broad but important topic", "broad but important topic"],
to increase the likelihood of a victim interacting with the phishing material. These topics may include geographic, political or financial themes.
[37, "to increase the likelihood of a victim interacting with the phishing material. These topics may include geographic, political or financial themes.", "to increase the likelihood of a victim interacting with the phishing material. These topics may include geographic, political or financial themes."],
Email Link: Phishing Website
[38, "Email Link: Phishing Website", "Email Link: Phishing Website"],
hovering over the link
[39, "hovering over the link", "hovering over the link"],
you'll see the true link location. Often this is enough to see the malicious intent.
[40, "you'll see the true link location. Often this is enough to see the malicious intent.", "you'll see the true link location. Often this is enough to see the malicious intent."],
Wrapping up
[41, "Wrapping up", "Wrapping up"],
If you
[42, "If you", "If you"],
spot anything suspicious
[43, "spot anything suspicious", "spot anything suspicious"],
with the email sender, subject, content, links or attachments
[44, "with the email sender, subject, content, links or attachments", "with the email sender, subject, content, links or attachments"],
Don't take the risk. Report the email to your IT or Security team for review.
[45, "Don't take the risk. Report the email to your IT or Security team for review.", "Don't take the risk. Report the email to your IT or Security team for review."],
Submit
[46, "Submit", "Submit"],
Next
[47, "Next", "Next"],
Back
[48, "Back", "Back"],
Malicious links will often appear with innocent looking text. By
[49, "Malicious links will often appear with innocent looking text. By", "Malicious links will often appear with innocent looking text. By"],
Correct!
[50, "Correct!", "Correct!"],
Incorrect
[51, "Incorrect", "Incorrect"],
True
[52, "True", "True"],
False
[53, "False", "False"],
Change language
[54, "Change language", "Change language"],
Current Language
[55, "Current Language", "Current Language"],
Use Browser Settings
[56, "Use Browser Settings", "Use Browser Settings"],
Select a language
[57, "Select a language", "Select a language"],
Change Language
[58, "Change Language", "Change Language"],
Please select a language
[59, "Please select a language", "Please select a language"],
Language
[60, "Language", "Language"],
Color Theme
[61, "Color Theme", "Color Theme"],
Color Theme And Background Selector
[62, "Color Theme And Background Selector", "Color Theme And Background Selector"],
Colorful Theme
[63, "Colorful Theme", "Colorful Theme"],
Select Theme
[64, "Select Theme", "Select Theme"],
Close
[65, "Close", "Close"],
Dark Theme
[66, "Dark Theme", "Dark Theme"],
Green Theme
[67, "Green Theme", "Green Theme"],
Purple Theme
[68, "Purple Theme", "Purple Theme"],
Light Theme
[69, "Light Theme", "Light Theme"],
Blue Theme
[70, "Blue Theme", "Blue Theme"],
Settings
[71, "Settings", "Settings"],
Theme Selected
[72, "Theme Selected", "Theme Selected"],
This training has been translated from English. If there is an inaccuracy, please report the correct translation by clicking here!
[73, "This training has been translated from English. If there is an inaccuracy, please report the correct translation by clicking here!", "This training has been translated from English. If there is an inaccuracy, please report the correct translation by clicking here!"],
Translation Correction
[74, "Translation Correction", "Translation Correction"],
Select a translation to correct...
[75, "Select a translation to correct...", "Select a translation to correct..."],
Original Text
[76, "Original Text", "Original Text"],
Correct Translation
[77, "Correct Translation", "Correct Translation"],
Translation to correct...
[78, "Translation to correct...", "Translation to correct..."],
Submissions are reviewed and applied within 48 hours.
[79, "Submissions are reviewed and applied within 48 hours.", "Submissions are reviewed and applied within 48 hours."],
Submit Correction
[80, "Submit Correction", "Submit Correction"],
Submission Successfully Sent
[81, "Submission Successfully Sent", "Submission Successfully Sent"],
Submission Error - Please Try Again
[82, "Submission Error - Please Try Again", "Submission Error - Please Try Again"],
Submission Sending...
[83, "Submission Sending...", "Submission Sending..."],
Mandatory Viewing
[84, "Mandatory Viewing", "Mandatory Viewing"],
Please watch the video from beginning to end before proceeding.
[85, "Please watch the video from beginning to end before proceeding.", "Please watch the video from beginning to end before proceeding."],
Ok
[86, "Ok", "Ok"],
Note: The Colorful, Blue, Light, and Dark Themes are all WCAG 2.2 Level AA conformant.
[87, "Note: The Colorful, Blue, Light, and Dark Themes are all WCAG 2.2 Level AA conformant.", "Note: The Colorful, Blue, Light, and Dark Themes are all WCAG 2.2 Level AA conformant."],
Language translation for this training module has been disabled and explicitly set to the following language
[88, "Language translation for this training module has been disabled and explicitly set to the following language", "Language translation for this training module has been disabled and explicitly set to the following language"],
QR-Phishing
[89, "QR-Phishing", "QR-Phishing"],
What is QR-Phishing?
[90, "What is QR-Phishing?", "What is QR-Phishing?"],
QR phishing (also known as quishing) is when attackers create fake QR codes that lead you somewhere you weren’t expecting. Often, the destination is a malicious website designed to steal your information, download malware, or trick you into taking unsafe actions.
[91, "QR phishing (also known as quishing) is when attackers create fake QR codes that lead you somewhere you weren’t expecting. Often, the destination is a malicious website designed to steal your information, download malware, or trick you into taking unsafe actions. ", "QR phishing (also known as quishing) is when attackers create fake QR codes that lead you somewhere you weren’t expecting. Often, the destination is a malicious website designed to steal your information, download malware, or trick you into taking unsafe actions. "],
Which of the following best describes what QR-Phishing is?
[92, "Which of the following best describes what QR-Phishing is? ", "Which of the following best describes what QR-Phishing is? "],
A scam where attackers use fake QR codes to steal information or download and install malware
[93, "A scam where attackers use fake QR codes to steal information or download and install malware", "A scam where attackers use fake QR codes to steal information or download and install malware"],
A method used by financial institutions to verify QR code payments through encrypted channels
[94, "A method used by financial institutions to verify QR code payments through encrypted channels ", "A method used by financial institutions to verify QR code payments through encrypted channels "],
A government policy for managing QR code use in digital services
[95, "A government policy for managing QR code use in digital services", "A government policy for managing QR code use in digital services"],
A data-sharing protocol that allows QR codes to link directly to secure cloud environments
[96, "A data-sharing protocol that allows QR codes to link directly to secure cloud environments", "A data-sharing protocol that allows QR codes to link directly to secure cloud environments"],
QR phishing is when attackers use fake QR codes to send you to malicious sites, download and install malware, or steal your information.
[97, "QR phishing is when attackers use fake QR codes to send you to malicious sites, download and install malware, or steal your information. ", "QR phishing is when attackers use fake QR codes to send you to malicious sites, download and install malware, or steal your information. "],
How to protect yourself from QR-phishing scams
[98, "How to protect yourself from QR-phishing scams", "How to protect yourself from QR-phishing scams"],
QR codes are everywhere, but that doesn’t mean they’re all safe. That’s why it’s important to check the context, preview the link, type the URL manually if something feels off, and never share sensitive information without a clear reason. Let’s explore these key safety tips in more detail.
[99, "QR codes are everywhere, but that doesn’t mean they’re all safe. That’s why it’s important to check the context, preview the link, type the URL manually if something feels off, and never share sensitive information without a clear reason. Let’s explore these key safety tips in more detail.", "QR codes are everywhere, but that doesn’t mean they’re all safe. That’s why it’s important to check the context, preview the link, type the URL manually if something feels off, and never share sensitive information without a clear reason. Let’s explore these key safety tips in more detail."],
Context Matters
[100, "Context Matters ", "Context Matters "],
Always check the context before scanning a QR code, especially in public places. If it’s randomly placed with no explanation, it could be planted by an attacker. Scanning a QR code without verifying its source or purpose leaves you vulnerable to potential scams.
[101, "Always check the context before scanning a QR code, especially in public places. If it’s randomly placed with no explanation, it could be planted by an attacker. Scanning a QR code without verifying its source or purpose leaves you vulnerable to potential scams.", "Always check the context before scanning a QR code, especially in public places. If it’s randomly placed with no explanation, it could be planted by an attacker. Scanning a QR code without verifying its source or purpose leaves you vulnerable to potential scams."],
Check The Link
[102, "Check The Link", "Check The Link"],
Before clicking a QR code link, check the URL preview that appears on your screen. Look for spelling errors, odd characters, or anything that feels off. If the link doesn’t match what you expected, don’t tap it.
[103, "Before clicking a QR code link, check the URL preview that appears on your screen. Look for spelling errors, odd characters, or anything that feels off. If the link doesn’t match what you expected, don’t tap it. ", "Before clicking a QR code link, check the URL preview that appears on your screen. Look for spelling errors, odd characters, or anything that feels off. If the link doesn’t match what you expected, don’t tap it. "],
Why is it risky to scan a QR code placed on a lamp post or public bench?
[104, "Why is it risky to scan a QR code placed on a lamp post or public bench? ", "Why is it risky to scan a QR code placed on a lamp post or public bench? "],
It might link to an outdated website
[105, "It might link to an outdated website ", "It might link to an outdated website "],
It could be a scavenger hunt clue
[106, "It could be a scavenger hunt clue", "It could be a scavenger hunt clue"],
It might redirect you to a malicious site
[107, "It might redirect you to a malicious site ", "It might redirect you to a malicious site "],
It could affect your phone’s battery life
[108, "It could affect your phone’s battery life", "It could affect your phone’s battery life"],
Public QR codes can be planted by attackers to entice you into interacting with malicious content. If the code looks random or has no clear reason for being there, it could be a scam.
[109, "Public QR codes can be planted by attackers to entice you into interacting with malicious content. If the code looks random or has no clear reason for being there, it could be a scam.", "Public QR codes can be planted by attackers to entice you into interacting with malicious content. If the code looks random or has no clear reason for being there, it could be a scam."],
Manually Enter The URL
[110, "Manually Enter The URL ", "Manually Enter The URL "],
If a QR code seems suspicious, don’t trust it. Where possible, instead of scanning, type the website address directly into your browser. That way, you know exactly where you’re going and are less likely to be tricked by a fake or misleading link.
[111, "If a QR code seems suspicious, don’t trust it. Where possible, instead of scanning, type the website address directly into your browser. That way, you know exactly where you’re going and are less likely to be tricked by a fake or misleading link.", "If a QR code seems suspicious, don’t trust it. Where possible, instead of scanning, type the website address directly into your browser. That way, you know exactly where you’re going and are less likely to be tricked by a fake or misleading link."],
When scanning a QR code, what should you do before clicking the link?
[112, "When scanning a QR code, what should you do before clicking the link? ", "When scanning a QR code, what should you do before clicking the link? "],
Open it immediately
[113, "Open it immediately ", "Open it immediately "],
Screenshot it for later
[114, "Screenshot it for later ", "Screenshot it for later "],
Forward it to a friend
[115, "Forward it to a friend ", "Forward it to a friend "],
Preview and verify the URL
[116, "Preview and verify the URL ", "Preview and verify the URL "],
Always check the link carefully. Fake URLs are designed to look real at first glance, but small differences can lead you to malicious sites and put your information at risk.
[117, "Always check the link carefully. Fake URLs are designed to look real at first glance, but small differences can lead you to malicious sites and put your information at risk. ", "Always check the link carefully. Fake URLs are designed to look real at first glance, but small differences can lead you to malicious sites and put your information at risk. "],
Protect Your Personal Information
[118, "Protect Your Personal Information", "Protect Your Personal Information"],
If a QR code immediately asks for personal or financial details, that’s a red flag. Legitimate organizations won’t request sensitive information without proper context, verification, or a secure environment. Always pause and question why the information is being requested before handing it over.
[119, "If a QR code immediately asks for personal or financial details, that’s a red flag. Legitimate organizations won’t request sensitive information without proper context, verification, or a secure environment. Always pause and question why the information is being requested before handing it over. ", "If a QR code immediately asks for personal or financial details, that’s a red flag. Legitimate organizations won’t request sensitive information without proper context, verification, or a secure environment. Always pause and question why the information is being requested before handing it over. "],
It is normal for a QR code to immediately ask for personal or financial information after scanning
[120, "It is normal for a QR code to immediately ask for personal or financial information after scanning", "It is normal for a QR code to immediately ask for personal or financial information after scanning"],
Legitimate organizations don’t ask for personal information right after a scan. If a QR code demands sensitive details without context, it’s likely a phishing scam. Always verify before trusting it.
[121, "Legitimate organizations don’t ask for personal information right after a scan. If a QR code demands sensitive details without context, it’s likely a phishing scam. Always verify before trusting it.", "Legitimate organizations don’t ask for personal information right after a scan. If a QR code demands sensitive details without context, it’s likely a phishing scam. Always verify before trusting it."],
Why is manually typing in a URL safer than scanning a QR code?
[122, "Why is manually typing in a URL safer than scanning a QR code?", "Why is manually typing in a URL safer than scanning a QR code?"],
It lets you control exactly where you go
[123, "It lets you control exactly where you go ", "It lets you control exactly where you go "],
It helps avoid typos
[124, "It helps avoid typos ", "It helps avoid typos "],
It prevents your phone from overheating
[125, "It prevents your phone from overheating ", "It prevents your phone from overheating "],
It makes you look tech-savvy
[126, " It makes you look tech-savvy ", " It makes you look tech-savvy "],
When you type a URL, you know exactly where you're going. With a QR code, you're trusting whoever made it. Attackers can use them to hide fake or dangerous links that look safe but are not.
[127, "When you type a URL, you know exactly where you're going. With a QR code, you're trusting whoever made it. Attackers can use them to hide fake or dangerous links that look safe but are not. ", "When you type a URL, you know exactly where you're going. With a QR code, you're trusting whoever made it. Attackers can use them to hide fake or dangerous links that look safe but are not. "],
What QR Codes Are Capable Of
[128, "What QR Codes Are Capable Of ", "What QR Codes Are Capable Of "],
QR codes are powerful shortcuts. They save time, simplify access, and make interactions almost effortless. That convenience can be hijacked. Here are just a few ways attackers can weaponize them.
[129, "QR codes are powerful shortcuts. They save time, simplify access, and make interactions almost effortless. That convenience can be hijacked. Here are just a few ways attackers can weaponize them. ", "QR codes are powerful shortcuts. They save time, simplify access, and make interactions almost effortless. That convenience can be hijacked. Here are just a few ways attackers can weaponize them. "],
Malicious Links & Downloads
[130, "Malicious Links & Downloads", "Malicious Links & Downloads"],
One quick scan can take you to a spoofed site that steals your credentials, or trigger a hidden download that installs malware on your device. These attacks often happen silently, leaving you unaware that anything went wrong until it's too late.
[131, "One quick scan can take you to a spoofed site that steals your credentials, or trigger a hidden download that installs malware on your device. These attacks often happen silently, leaving you unaware that anything went wrong until it's too late. ", "One quick scan can take you to a spoofed site that steals your credentials, or trigger a hidden download that installs malware on your device. These attacks often happen silently, leaving you unaware that anything went wrong until it's too late. "],
Pre-Filled Emails & Texts
[132, " Pre-Filled Emails & Texts ", " Pre-Filled Emails & Texts "],
Cybercriminals often use digital or physically printed QR codes to embed a smart link, which, when scanned and clicked, automatically detects the victim's operating system and then loads their device's native app store, with a malicious app ready for installation.
[133, "Cybercriminals often use digital or physically printed QR codes to embed a smart link, which, when scanned and clicked, automatically detects the victim's operating system and then loads their device's native app store, with a malicious app ready for installation.", "Cybercriminals often use digital or physically printed QR codes to embed a smart link, which, when scanned and clicked, automatically detects the victim's operating system and then loads their device's native app store, with a malicious app ready for installation."],
Fake Wi-Fi & Calendar Invites
[134, " Fake Wi-Fi & Calendar Invites", " Fake Wi-Fi & Calendar Invites"],
QR codes can silently insert events into your calendar or connect your device to an unsecured WiFi network. That “meeting invite” might contain phishing links, and that "free hotspot" could be a setup to intercept your data and monitor activity without your knowledge.
[135, "QR codes can silently insert events into your calendar or connect your device to an unsecured WiFi network. That “meeting invite” might contain phishing links, and that "free hotspot" could be a setup to intercept your data and monitor activity without your knowledge. ", "QR codes can silently insert events into your calendar or connect your device to an unsecured WiFi network. That “meeting invite” might contain phishing links, and that "free hotspot" could be a setup to intercept your data and monitor activity without your knowledge. "],
Which of the following could a malicious QR code do?
[136, "Which of the following could a malicious QR code do?", "Which of the following could a malicious QR code do?"],
Link you to a secure government portal
[137, "Link you to a secure government portal ", "Link you to a secure government portal "],
Increase your download speed
[138, "Increase your download speed", "Increase your download speed"],
Connect your device to a fake Wi-Fi network
[139, "Connect your device to a fake Wi-Fi network ", "Connect your device to a fake Wi-Fi network "],
Enable airplane mode for security
[140, "Enable airplane mode for security", "Enable airplane mode for security"],
Cybercriminals use QR codes to embed fake Wi-Fi network configurations, which mobile devices then use to automatically connect to a rogue Wi-Fi network, which in this case is controlled by the attacker, with all data being intercepted.
[141, "Cybercriminals use QR codes to embed fake Wi-Fi network configurations, which mobile devices then use to automatically connect to a rogue Wi-Fi network, which in this case is controlled by the attacker, with all data being intercepted.", "Cybercriminals use QR codes to embed fake Wi-Fi network configurations, which mobile devices then use to automatically connect to a rogue Wi-Fi network, which in this case is controlled by the attacker, with all data being intercepted."],
Which of these is NOT a safe QR code practice?
[142, "Which of these is NOT a safe QR code practice?", "Which of these is NOT a safe QR code practice?"],
Previewing the link before tapping
[143, "Previewing the link before tapping ", "Previewing the link before tapping "],
Scanning QR codes in public bathrooms
[144, "Scanning QR codes in public bathrooms ", "Scanning QR codes in public bathrooms "],
Scanning QR codes on official business documents
[145, "Scanning QR codes on official business documents ", "Scanning QR codes on official business documents "],
Typing the URL directly if something feels off
[146, "Typing the URL directly if something feels off ", "Typing the URL directly if something feels off "],
Scanning QR codes in public bathrooms is unsafe because anyone, including cybercriminals, could have placed those codes there.
[147, "Scanning QR codes in public bathrooms is unsafe because anyone, including cybercriminals, could have placed those codes there. ", "Scanning QR codes in public bathrooms is unsafe because anyone, including cybercriminals, could have placed those codes there. "],
A restaurant QR code stand asks for your credit card information immediately. What should you do?
[148, "A restaurant QR code stand asks for your credit card information immediately. What should you do?", "A restaurant QR code stand asks for your credit card information immediately. What should you do?"],
Enter fake details to test it
[149, "Enter fake details to test it ", "Enter fake details to test it "],
Close the site and alert staff
[150, "Close the site and alert staff ", "Close the site and alert staff "],
Refresh the page
[151, "Refresh the page", "Refresh the page"],
Use a different browser
[152, "Use a different browser ", "Use a different browser "],
If a QR code leads to a page asking for credit card information, especially somewhere like a restaurant, it’s a red flag. Legitimate menu links shouldn’t ask for payment up front.
[153, "If a QR code leads to a page asking for credit card information, especially somewhere like a restaurant, it’s a red flag. Legitimate menu links shouldn’t ask for payment up front. ", "If a QR code leads to a page asking for credit card information, especially somewhere like a restaurant, it’s a red flag. Legitimate menu links shouldn’t ask for payment up front. "],
Risks Beyond Public Spaces
[154, "Risks Beyond Public Spaces ", "Risks Beyond Public Spaces "],
QR codes aren’t just showing up on posters and stickers anymore. Scammers are slipping them into phishing emails, SMS messages, social media posts, and even fake bills sent by post. These codes are used to bypass traditional security filters and catch you off guard in more trusted, private settings.
[155, "QR codes aren’t just showing up on posters and stickers anymore. Scammers are slipping them into phishing emails, SMS messages, social media posts, and even fake bills sent by post. These codes are used to bypass traditional security filters and catch you off guard in more trusted, private settings.", "QR codes aren’t just showing up on posters and stickers anymore. Scammers are slipping them into phishing emails, SMS messages, social media posts, and even fake bills sent by post. These codes are used to bypass traditional security filters and catch you off guard in more trusted, private settings."],
Which of the following is a non-public way scammers might deliver malicious QR codes?
[156, "Which of the following is a non-public way scammers might deliver malicious QR codes?", "Which of the following is a non-public way scammers might deliver malicious QR codes?"],
Sending it via SMS message
[157, "Sending it via SMS message ", "Sending it via SMS message "],
Including it in an email attachment
[158, "Including it in an email attachment ", "Including it in an email attachment "],
Printing it on a fake invoice sent by mail
[159, "Printing it on a fake invoice sent by mail", "Printing it on a fake invoice sent by mail"],
All of the above
[160, "All of the above", "All of the above"],
Scammers can deliver malicious QR codes through SMS messages, email attachments, and fake invoices sent by post. These methods target you in more trusted environments, increasing the chances you'll scan without thinking.
[161, "Scammers can deliver malicious QR codes through SMS messages, email attachments, and fake invoices sent by post. These methods target you in more trusted environments, increasing the chances you'll scan without thinking. ", "Scammers can deliver malicious QR codes through SMS messages, email attachments, and fake invoices sent by post. These methods target you in more trusted environments, increasing the chances you'll scan without thinking. "],
Importance of understanding QR-phishing
[162, "Importance of understanding QR-phishing ", "Importance of understanding QR-phishing "],
QR-phishing is a growing threat that preys on convenience and habit. With QR codes popping up on menus, posters, and invoices, people often scan without a second thought. Slowing down before scanning helps keep cybercriminals out.
[163, "QR-phishing is a growing threat that preys on convenience and habit. With QR codes popping up on menus, posters, and invoices, people often scan without a second thought. Slowing down before scanning helps keep cybercriminals out. ", "QR-phishing is a growing threat that preys on convenience and habit. With QR codes popping up on menus, posters, and invoices, people often scan without a second thought. Slowing down before scanning helps keep cybercriminals out. "],
The Importance of QR Scam Awareness
[164, "The Importance of QR Scam Awareness ", "The Importance of QR Scam Awareness "],
Stay vigilant. Always check the context of a QR code before scanning. Preview the link before clicking or better yet, type it in yourself. A few smart habits can stop QR phishing and help keep you one step ahead of scammers.
[165, "Stay vigilant. Always check the context of a QR code before scanning. Preview the link before clicking or better yet, type it in yourself. A few smart habits can stop QR phishing and help keep you one step ahead of scammers. ", "Stay vigilant. Always check the context of a QR code before scanning. Preview the link before clicking or better yet, type it in yourself. A few smart habits can stop QR phishing and help keep you one step ahead of scammers. "],
[166, "", ""],
Original Text (English)
Correct Translation (English)
Submissions are reviewed and applied within 48 hours.
Color Theme And Background Selector
×
Colorful Theme
Select Theme
Blue Theme
Select Theme
Light Theme
Select Theme
Purple Theme
Select Theme
Green Theme
Select Theme
Dark Theme
Select Theme
Note: The Colorful, Blue, Light, and Dark Themes are all WCAG 2.2 Level AA conformant.