|
Read Hakin9‘s QR Code Hacking Tutorial and Learn How To Avoid Data Loss |
||
You received this newsletter because you subscribed to autoresponder address list of Hakin9 magazine.
If you want to unsubscribe please click the link. Dear Readers,
we are pleased to inform you that our new tutorial about QR code hacking has just arrived. You can download it here.
In this issue you will find articles such as:
QR Code Hacking
BASICS
Hacking QR Codes
By Rishabh Rastogi An information security, risk and governance minded professional who thrives on evaluating technologies and business processes from a critical perspective. Popularly QR Codes have found their application in encoding URLs, visiting cards, addresses and various forms of advertisement data on posters. Along with its great uses, QR codes have also many potential risks due to the vulnerabilities around its design and hence prying threat vectors would always be after exploiting those vulnerabilities. Hence not making a very sweeping statement, but funnily enough every kid on the block has a QR Code scanner and is a potential victim of being hacked. Sim Card Hacking
By Carlos Rodriquez Perez Imagine you’re a malware developer, and you are looking for new techniques to spread your malware, you’re tired of thinking and suddenly you have an idea, why not include my trojan in a QR Code? This is the question that many cyberdelinquents ask to themselves, is very easy to pass a trojan by an application for our smatphone, for example an X-Ray Reader (fake of course), once we have read the fraudulent code, the malware disburdens himself and attack, usually the attack consists in a malware that is installed in our smatphone, once installed is dedicated to ilegal activities, such as sending SMS to a payment service that takes advantages of the attacker. THE TECHNIQUES
Hijacking QR Codes
By David Allen Managing Director at @MobileEngage The QR code system was invented in 1994 by Toyota’s subsidiary, Denso Wave. Its purpose was to track vehicles during manufacturing; it was designed to allow high-speed component scanning. It has since become one of the most popular types of two-dimensional barcodes. Originally designed for industrial uses, QR codes have become common in consumer advertising. Typically, a smartphone is used as a QR-code scanner, displaying the code and converting it to some useful form. QR Code A Real Treat Or Not
By Antonio Ierano Security Consultant, Evangelist, Speaker, Trainer and Blogger at The Puchi Herald We could easily create a related to a malware infection, convert this URL through a shortened URL service, associate it to a common logo and embed this info in a QRCode. A normal User would check the code through its application and would find a familiar logo to click on; although he would check the URL he would probably see the short version that is anyway not readable. Unless the user is using on its smartphone or tablet a security suite could be easily fooled and redirected anywhere. QR Codes: Convenience or Minefield?
By David Nordell CEO of New Global Markets Imagine that you are walking in the street in the town where you live. You need to find a new place to live, and don’t really want to use an estate agent, because they usually lie about the places they have available, and charge a commission too. But you pass a tree with a sheet of paper stapled to the bark, reading “beautiful two-room apartment, lots of light, modern kitchen and bathroom … no agents.” QR Codes – Hacking, cracking and other security considerations.
By V. Michael Balas Founder and CEO at VitreoQR, LLC On March 6th of 1992, the world waited for the Michaelangelo Computer Virus to strike hundreds of thousands of computers across the planet. The threat was so great this one computer event received massive and widespread media attention in virtually every industrialized country. Ultimately, the virus did little actual damage but its media coverage frightened the world into a more pro-active position regarding protection from such attacks. The antivirus software industry now had its first truly legitimate example of the need for antivirus software. John McAfee was well on his way to making millions. 6 Ways To Protect Yourself From QR Code Hacking
By Nick Lynch Co-Founder of OakReach, a native ad and content marketing platform In today’s fast moving times, getting information and content instantly at our figure tips has become an increasing necessity. Because of this, Quick Response (QR) codes continue to be the biggest driver of print to mobile activations. When scanned, the codes often contain web links that automatically take a user to a website. Over the last few years, the practice of placing this type of matrix barcode on billboards, posters, clothing tags, concert tickets, business cards, TV ads and magazines has become common practice. According to ClickZ.com, QR scans saw an increase of 400% between June 2011 and June 2012. EXTRA
Interview with Nick Lynch
By Magdalena Gierwatowska Interview with Antonio Ierano
By Magdalena Gierwatowska |
Please spread the word about Hakin9.
Hakin9 team wish you good reading! Product Manager: krzysztof.samborski@hakin9.org www.hakin9.org/en |
New profiles on:
|
Related articles
- The dangers of QR codes for security
- Microsoft Tag throws in the towel, QR code beats chest in victory
- Nmap Guide Revisited – Hakin9 Tutorials | Magazine | Hackers about hacking techniques in our IT Security Magazine
Related Posts via Taxonomies
To the official site of Related Posts via Taxonomies.
Discover more from The Puchi Herald Magazine
Subscribe to get the latest posts sent to your email.
check out my new article on hakin9 by The Puchi Herald Magazine is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.