Skip to main content

Phishing and QR code scams stopping holiday shoppers?

 Most stores are offering online sales to help consumers avoid crowds within small spaces. Sales have started on Amazon.com, Target.com, Best Buy’s website and many other major retailers’ e-commerce platforms.

As you shop, remain alert when it comes to phishing schemes. Phishing is a deliberate attempt to steal sensitive information, including login credentials and/or credit card numbers, by masquerading as someone trustworthy.

QR code scams are also on the rise. QR codes were originally developed by the auto-industry to provide efficient means of accessing large repositories of information. QR codes made inventory tracking easy. Users point at a special square with a phone, and information quickly downloads. Eventually, advertising agencies and others picked up on the utility of this tool.

As smartphones grew increasingly popular, so did the use of these cool codes. However, counterfeit QR codes are now a serious concern.

Phishing: What’s happened so far this year?

Last month, one in every 11,000 shopping related emails was malicious. This month, one in every 826 shopping-related emails comes up as malicious.

Phishing scams enabled hackers to steal nearly 22 billion dollars during the first 10 days of November alone, according to Check Point Software security research experts. Hackers are “…using some of those less sensational but very frequent terms, like “cheap” and “sale” and “percentage off” and “special offers” to attract folks that click on…unsolicited emails,” says expert Mark Ostrowski.

QR code scams: Beware of the square

QR codes can enable consumers to easily scan and browse restaurant menus or to make contactless payments. But hackers have taken to replacing real QR codes with phony look-a-likes that can download malicious software onto phones.

Earlier this year, federal police in Belgium issued a warning about these types of fraudulent activities. Last year, hackers running malicious QR code scams stole roughly 90 million yuan ($18.5 million) in QR code scams.

“QR codes are not inherently secure or trustworthy, and hackers know that a majority of people have little or no security on their phones at all, so we strongly advise everyone to use a mobile security solution to protect their devices and data against phishing, malicious apps and malware,” said a cyber security spokesperson for Check Point Software.

As you enjoy takeout meals or make purchases, beware of the square. Most phones lack the security to protect against QR code scams.

Comments

Popular posts from this blog

Site-to-site IPsec VPN with two FortiGates

In this example, you will allow transparent communication between two networks that are located behind different FortiGates at different offices using route-based IPsec VPN. The VPN will be created on both FortiGates by using the VPN Wizard's   Site to Site - FortiGate   template. In this example, one office will be referred to as HQ and the other will be referred to as Branch. 1. Configuring the HQ IPsec VPN On the HQ FortiGate, go to  VPN > IPsec Wizard . Select the  Site to Site  template, and select  FortiGate . In the  Authentication  step, set  IP Address  to the IP of the Branch FortiGate (in the example,  172.20.120.135 ). After you enter the gateway, an available interface will be assigned as the  Outgoing Interface . If you wish to use a different interface, select it from the drop-down menu. Set a secure  Pre-shared Key . In the  Policy & Routing  step, set the  Loca...

Cisco Releases Security Updates for Cisco ASA 5506-X, 5508-X, 5516-X and Firepower// Cisco Bug IDs: CSCvp36425

A vulnerability in the cryptographic driver for Cisco Adaptive Security Appliance Software (ASA) and Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause the device to reboot unexpectedly. The vulnerability is due to incomplete input validation of a Secure Sockets Layer (SSL) or Transport Layer Security (TLS) ingress packet header. An attacker could exploit this vulnerability by sending a crafted TLS/SSL packet to an interface on the targeted device. An exploit could allow the attacker to cause the device to reload, which will result in a denial of service (DoS) condition. Note:  Only traffic directed to the affected system can be used to exploit this vulnerability. This vulnerability affects systems configured in routed and transparent firewall mode and in single or multiple context mode. This vulnerability can be triggered by IPv4 and IPv6 traffic. A valid SSL or TLS session is required to exploit this vulnerability. Cisco has...

Beware! Playing Untrusted Videos On VLC Player Could Hack Your Computer

If you use VLC media player on your computer and haven't updated it recently, don't you even dare to play any untrusted, randomly downloaded video file on it. Doing so could allow hackers to remotely take full control over your computer system. That's because VLC media player software versions prior to 3.0.7 contain  two high-risk security vulnerabilities , besides many other medium- and low-severity security flaws, that could potentially lead to arbitrary code execution attacks. With more than 3 billion downloads, VLC is a hugely popular open-source media player software that is currently being used by hundreds of millions of users worldwide on all major platforms, including Windows, macOS, Linux, as well as Android and iOS mobile platforms. Discovered by Symeon Paraschoudis from Pen Test Partners and identified as  CVE-2019-12874 , the first high-severity vulnerability is a double-free issue which resides in "zlib_decompress_extra" function of VideoLAN VLC ...