Stop using QR codes. - Explained in 2 minutes.

Plain English, in 2 minutes. You have 2 minutes don’t you? Think QR codes are just convenient shortcuts? Think again. In this video, we dive into the dark side of those seemingly innocent squares. You’ll see how a simple scan can open the door to a world of trouble—from malware invading your phone to hackers spying on you through your camera and stealing your personal information. Learn why even the most trustworthy-looking QR codes can’t be trusted and why you might want to think twice before you scan. The moral of the story? Don’t use QR codes. Period. No exceptions. Here is some additional information because of all the people complaining that this video is clickbait. Here is the FBI’s warning on QR Codes: Here is a direct quote from the FBI’s warning: “Cybercriminals tamper with both digital and physical QR codes to replace legitimate codes with malicious codes. A victim scans what they think to be a legitimate code but the tampered code directs victims to a malicious site, which prompts them to enter login and financial information. Access to this victim information gives the cybercriminal the ability to potentially steal funds through victim accounts. Malicious QR codes may also contain embedded malware, allowing a criminal to gain access to the victim’s mobile device and steal the victim’s location as well as personal and financial information. The cybercriminal can leverage the stolen financial information to withdraw funds from victim accounts.“ Here is the Michigan Attorney General’s warning on QR Codes: Here is a quote from the Michigan attorney generals warning: “Malicious QR codes can: Take you to a “phishing website.” Scammers create sites that look convincing and ask for personal information. Any information you provide on this site goes to the scammer. Be used to download malicious software such as malware, ransomware, and trojans. These viruses can spy on you, steal sensitive information or files (like photos or videos), or even encrypt your device until you pay a ransom. Be programmed to open apps on your device. It could open financial apps, social media accounts, and email accounts. It can compose and send messages to your contacts using your email or social media accounts. Be used in phishing emails. QR codes are not picked up by security software, unlike attachments and links.“ #Privacy,#DataTracking,#SmartDevices,#TechSecrets,#AdTech,#OnlineSafety,#DigitalPrivacy,#QRCode,#Hacker,#Cybersecurity,#iPhone,#Android,#Samsung,#DataPrivacy,#Surveillance,#TechTips,#MobileSecurity,#InternetSafety,#TechHacks,#DigitalSecurity,#CyberThreats,#OnlineSecurity,#IdentityTheft,#SecurityAwareness,#WirelessSecurity,#PrivacyMatters,#DataProtection,#SmartPhoneSecurity,#ProtectYourData,#CyberAwareness,#SecurityBreach,#PrivacyTech,#Spying,#MassSurveillance,#Spyware,#SpyTech,#CCTV,#GovernmentSurveillance,#FacialRecognition,#SpyGadgets,#PhoneTracking,#GPSTracking,#Wiretapping,#LocationTracking,#Espionage,#TrackingDevices,#DigitalTracking,#CovertSurveillance,#CyberEspionage,#StateSurveillance,#GeoTracking,#Eavesdropping,#DigitalInvasion,#PublicSurveillance,#TechSpying,#OnlineMonitoring,#Eavesdropping,#PrivacyThreats
Back to Top