check out my new article on hakin9

http://hakin9.org/read-hakin9s-qr-code-hacking-issue-and-get-knowledge-how-to-protect-yourself-from-data-loss/

Read Hakin9‘s QR Code Hacking Tutorial and Learn How To Avoid Data Loss

You received this newsletter because you subscribed to autoresponder address list of Hakin9 magazine.
If you want to unsubscribe please click the link.

Dear Readers,

we are pleased to inform you that our new tutorial about QR code hacking has just arrived. You can download it here.

In this issue you will find articles such as:

QR Code Hacking

BASICS

Hacking QR Codes
By Rishabh Rastogi
An information security, risk and governance minded professional who thrives on evaluating technologies and business processes from a critical perspective.

Popularly QR Codes have found their application in encoding URLs, visiting cards, addresses and various forms of advertisement data on posters. Along with its great uses, QR codes have also many potential risks due to the vulnerabilities around its design and hence prying threat vectors would always be after exploiting those vulnerabilities. Hence not making a very sweeping statement, but
funnily enough every kid on the block has a QR Code scanner and is a potential victim of being hacked.

Sim Card Hacking
By Carlos Rodriquez Perez
Imagine you’re a malware developer, and you are looking for new techniques to spread your malware, you’re tired of thinking and suddenly you have an idea, why not include my trojan in a QR Code? This is the question that many cyberdelinquents ask to themselves, is very easy to pass a trojan by an application for our smatphone, for example an X-Ray Reader (fake of course), once we have read the fraudulent code, the malware disburdens himself and attack, usually the attack consists in a malware that is installed in our smatphone, once installed is dedicated to ilegal activities, such as sending SMS to a payment service that takes advantages of the attacker.

THE TECHNIQUES

Hijacking QR Codes
By David Allen
Managing Director at @MobileEngage

The QR code system was invented in 1994 by Toyota’s subsidiary, Denso Wave. Its purpose was to track vehicles during manufacturing; it was designed to allow high-speed component scanning. It has since become one of the most popular types of two-dimensional barcodes. Originally designed for industrial uses, QR codes have become common in consumer advertising. Typically, a smartphone is used as a QR-code scanner, displaying the code and converting it to some useful form.

QR Code A Real Treat Or Not
By Antonio Ierano
Security Consultant, Evangelist, Speaker, Trainer and Blogger at The Puchi Herald

We could easily create a related to a malware infection, convert this URL through a shortened URL service, associate it to a common logo and embed this info in a QRCode. A normal User would check the code through its application and would find a familiar logo to click on; although he would check the URL he would probably see the short version that is anyway not readable. Unless the user is using on its smartphone or tablet a security suite could be easily fooled and redirected anywhere.

QR Codes: Convenience or Minefield?
By David Nordell
CEO of New Global Markets

Imagine that you are walking in the street in the town where you live. You need to find a new place to live, and don’t really want to use an estate agent, because they usually lie about the places they have available, and charge a commission too. But you pass a tree with a sheet of paper stapled to the bark, reading “beautiful two-room apartment, lots of light, modern kitchen and bathroom … no agents.”

QR Codes – Hacking, cracking and other security considerations.
By V. Michael Balas
Founder and CEO at VitreoQR, LLC

On March 6th of 1992, the world waited for the Michaelangelo Computer Virus to strike hundreds of thousands of computers across the planet. The threat was so great this one computer event received massive and widespread media attention in virtually every industrialized country. Ultimately, the virus did little actual damage but its media coverage frightened the world into a more pro-active position regarding protection from such attacks. The antivirus software industry now had its first truly legitimate example of the need for antivirus software. John McAfee was well on his way to making millions.

6 Ways To Protect Yourself From QR Code Hacking
By Nick Lynch
Co-Founder of OakReach, a native ad and content marketing platform

In today’s fast moving times, getting information and content instantly at our figure tips has become an increasing necessity. Because of this, Quick Response (QR) codes continue to be the biggest driver of print to mobile activations. When scanned, the codes often contain web links that automatically take a user to a website. Over the last few years, the practice of placing this type of matrix barcode on billboards, posters, clothing tags, concert tickets, business cards, TV ads and magazines has become common practice. According to ClickZ.com, QR scans saw an increase of 400% between June 2011 and June 2012.

EXTRA

Interview with Nick Lynch
By Magdalena Gierwatowska

Interview with Antonio Ierano
By Magdalena Gierwatowska

Please spread the word about Hakin9.
Hakin9 team wish you good reading!
Product Manager: krzysztof.samborski@hakin9.org
www.hakin9.org/en

New profiles on:

Related articles

Enhanced by Zemanta
http://feeds.feedburner.com/portadiferro
Antonio Ieranò
CSO, Cyber Security Architect, technical evangelist, consultant, writer, journalist and trainer
I am a Security Manager and architect, CSO, BDM, marketing specialist, and tech evangelist with over 20 years of experience serving as a community liaison, subject matter expert, and high-profile trainer for key technologies and solutions. My experience includes acting as the public face of Huawei technology and before Cisco security technologies; leading pan-European technical teams in development of new Cisco security products; and serving as a key public speaker and trainer on behalf of new high-tech products. My expertise spans IT development and implementation, marketing strategy, legal issues, and budget / financial management.

Specialties and Executive Expertise
IT Strategy, Technical Audits, Enterprise Architecture & Applications, Technical Sales Liaison, Solution Architecture, Network Design, Architecture, & Security, Vulnerability Assessment & Management, Systems Engineering, Data Privacy, Cloud Computing, Marketing Strategy, Budget Management, Social Media Marketing, High-Impact Presentations,incident handling, Forensics, Italian companies, Authentication, Infrastructure security, Security manager, Security issues, Attacks, Security infrastructure, Data encryption

Security and Technical Advisoring
Project Management
Business Development and Marketing

To the official site of Related Posts via Taxonomies.

CC BY-NC-SA 4.0 check out my new article on hakin9 by The Puchi Herald Magazine is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.