With a spreading of using QR codes, general users need to know how to use and be careful on using or scanning QR code.
We mentioned earlier about this code, however, we'd like to make sure how to use and how to avoid from malicious effects.
[ QR Code: a channel to spread malware? ]
http://totaldefense.com/securityblog/2011/08/26/QR-Code-a-channel-to-spread-malware.aspx
http://totaldefense.com/securityblog/2011/08/26/QR-Code-a-channel-to-spread-malware.aspx
2. What is QR and its exploitability?
A QR code (abbreviated from Quick Response code) is a type of matrix barcode (or two-dimensional code) designed to be read by smartphones. The code consists of black modules arranged in a square pattern on a white background. The information encoded may be text, a URL, or other data.
This QR code can contain various information, and can be scanned by scan application of smartphone.
<QR Code>
How can we create QR code?
A. We can visit one of QR code generating site.
* QR code generating site : http://www.bit.ly/
When we type address to be shorten, we can get a shorten URL.
* http://www.nprotect.com/ -> http://bit.ly/cSNgWa
B. Attaching at the end of the address ".qr" will create QR code of shorten address.
Such as (http://bit.ly/cSNgWa) to (http://bit.ly/cSNgWa.qr).
We can find any kinds of information can be saved as a QR code, malicious file programmer and distributor also can use QR code to do malicious behavior.
If QR code contains certain information of malicious file, general user can't notice easily with just given shorten form URL.
< QR code is used in various ways >
3. How to prevent
We use, enjoy, and even work with smartphone. With the spreading of smartphone, malicious applications for mobile are getting spread. In the midst of big booming of QR code, it can be used as a malicious way and can be new trend of security threats.
To use PC safely from security threats of these malicious stuffs, we recommend following "Security management tips" for general users.
Security management tips
1. Maintain the latest security update on OS and applications
2. Use anti-virus SW from believable security company and keep updating the latest engine and using real time detecting function
3. Do not see and download attached file from suspicious e-mail.
4. Keep caution to link from instant messenger and SNS.
5. Execute downloaded file after scan with anti-virus SW.
1. Maintain the latest security update on OS and applications
2. Use anti-virus SW from believable security company and keep updating the latest engine and using real time detecting function
3. Do not see and download attached file from suspicious e-mail.
4. Keep caution to link from instant messenger and SNS.
5. Execute downloaded file after scan with anti-virus SW.
INCA Internet (Security Response Center / Emergency Response Team) provides diagnosis/treatment function with nProtect Anti-Virus/Spyware for detecting such as malicious file stated above and runs responding system against various security threats.
شركة جلي بلاط بالخرج
ReplyDeleteشركة مكافحة النمل الابيض بالخرج
شركة رش مبيدات بالخرج
شركة مكافحة حشرات بالخرج
شركة تنظيف بالخرج
شركة تنظيف خزانات بالخرج
شركة رش مبيدات بالخرج
شركة رش مبيدات بالخرج
شركة تنظيف شقق بالمدينة المنورة
شركة تنظيف بالمدينة المنورة
شركة تنظيف موكيت بالمدينة المنورة
شركة تنظيف سجاد بالمدينة المنورة
شركة تنظيف مجالس بالمدينة المنورة
شركة تنظيف فلل بالمدينة المنورة
And at this blog you will find some more information regarding this particular issue.
Deleteایوان باند
And at this blog you will find some more information regarding this particular issue.
امو باند
هوروش باند
And at this blog you will find some more information regarding this particular issue.
ReplyDelete