{"id":3779,"date":"2024-02-08T08:26:00","date_gmt":"2024-02-08T08:26:00","guid":{"rendered":"https:\/\/qr.io\/blog\/?p=3779"},"modified":"2025-04-21T15:00:50","modified_gmt":"2025-04-21T15:00:50","slug":"quishing-alert-how-to-spot-and-thwart-qr-code-phishing-scams","status":"publish","type":"post","link":"https:\/\/qr.io\/blog\/quishing-alert-how-to-spot-and-thwart-qr-code-phishing-scams\/","title":{"rendered":"Quishing Alert: How to Spot and Thwart QR Code Phishing Scams"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"585\" src=\"https:\/\/qr.io\/blog\/wp-content\/uploads\/2024\/02\/quishing-1024x585.jpg\" alt=\"\" class=\"wp-image-3782\" srcset=\"https:\/\/qr.io\/blog\/wp-content\/uploads\/2024\/02\/quishing-1024x585.jpg 1024w, https:\/\/qr.io\/blog\/wp-content\/uploads\/2024\/02\/quishing-300x171.jpg 300w, https:\/\/qr.io\/blog\/wp-content\/uploads\/2024\/02\/quishing-768x439.jpg 768w, https:\/\/qr.io\/blog\/wp-content\/uploads\/2024\/02\/quishing.jpg 1500w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-fe42db420dbcff68ab15106526a2facc\">Have you ever scanned a QR code and wondered if it\u2019s safe? With quishing\u2014fraudulent use of QR codes\u2014lurking online, it\u2019s wise to be cautious.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-e826ccd038dfc7b2e35a998c1e6a62a7\">In this guide, you will learn how to spot and stop quishing scams before they compromise your privacy and security.<\/p>\n\n\n<h2 class=\"simpletoc-title\">Table of Contents<\/h2>\n<ul class=\"simpletoc-list\" style=\"padding-left:0;list-style:none;\">\n<li><a href=\"#understanding-quishing-the-basics\">Understanding Quishing: The Basics<\/a>\n\n<\/li>\n<li><a href=\"#the-anatomy-of-a-quishing-attack\">The Anatomy of a Quishing Attack<\/a>\n\n<\/li>\n<li><a href=\"#quishing-vs-smishing-and-vishing-comparing-social-engineering-techniques\">Quishing vs. Smishing and Vishing: Comparing Social Engineering Techniques<\/a>\n\n<\/li>\n<li><a href=\"#dangers-of-falling-for-quishing-scams\">Dangers of Falling for Quishing Scams<\/a>\n\n<\/li>\n<li><a href=\"#strategies-to-detect-and-prevent-quishing-attacks\">Strategies to Detect and Prevent Quishing Attacks<\/a>\n\n\n<ul><li>\n<a href=\"#employee-training-and-awareness\">Employee Training and Awareness<\/a>\n\n<\/li>\n<li><a href=\"#technological-solutions\">Technological Solutions<\/a>\n\n<\/li>\n<li><a href=\"#policy-and-procedures\">Policy and Procedures<\/a>\n\n<\/li>\n<\/ul>\n<li><a href=\"#case-studies-reallife-quishing-incidents\">Case Studies: Real-Life Quishing Incidents<\/a>\n\n<\/li>\n<li><a href=\"#best-practices-for-safe-qr-code-usage\">Best Practices for Safe QR Code Usage<\/a>\n\n\n<ul><li>\n<a href=\"#personal-vigilance\">Personal Vigilance<\/a>\n\n<\/li>\n<li><a href=\"#secure-qr-code-generation\">Secure QR Code Generation<\/a>\n\n<\/li>\n<li><a href=\"#regular-security-audits-and-updates\">Regular Security Audits and Updates<\/a>\n\n<\/li>\n<\/ul>\n<li><a href=\"#faqs\">FAQs<\/a>\n\n\n<ul><li>\n<a href=\"#what-is-an-example-of-quishing-in-social-engineering\">What is an example of quishing in social engineering?<\/a>\n\n<\/li>\n<li><a href=\"#is-quishing-the-new-phishing\">Is quishing the new phishing?<\/a>\n\n<\/li>\n<li><a href=\"#what-is-quishing\">What is quishing?<\/a>\n\n<\/li>\n<li><a href=\"#how-does-a-quishing-attack-work\">How does a quishing attack work?<\/a>\n\n<\/li>\n<li><a href=\"#what-are-some-strategies-to-detect-and-prevent-quishing-attacks\">What are some strategies to detect and prevent quishing attacks?<\/a>\n\n<\/li>\n<\/ul>\n<li><a href=\"#wrapup\">Wrap-Up<\/a>\n<\/li><\/ul>\n\n<h2 class=\"wp-block-heading\" id=\"understanding-quishing-the-basics\">Understanding Quishing: The Basics<\/h2>\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-9f02b477c39edccc206e4ec22af7652d\">Quishing, short for \u2018quick response code phishing\u2019, is a term that arose from the increased use of QR codes, particularly during the COVID-19 pandemic.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-1905be23f1be74d7e8560a6df87c6b35\">Cybercriminals began exploiting the QR code technology to conduct phishing scams, leading to the coining of the term \u2018quishing\u2019. This deceptive practice involves tricking individuals into scanning a QR code that leads them to fraudulent activities, such as revealing sensitive information or downloading malware.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-a3fe0a27d2edff27076be5c0c646e58b\">Quishing attacks can take various forms. They can:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Direct victims to malicious websites that automatically download malware, ranging from spyware to ransomware<\/li>\n\n\n\n<li>Lead to the creation of payments or social media following<\/li>\n\n\n\n<li>Send pre-written emails from the victim\u2019s account, leading to impersonation and further attacks.<\/li>\n<\/ul>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-49feccd4e672dbb76852baf4472e0cb3\">The universal adoption of QR codes across different sectors presents new opportunities for cybercriminals to exploit them for quishing attacks, making quishing a growing cybersecurity threat.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-35e5f03f72c83d95b4fd3ef8054189f8\"><em>Also see: <a href=\"https:\/\/qr.io\/blog\/beware-why-you-should-not-scan-any-random-qr-code\/\">Beware: Why You Should not Scan Any Random QR Code<\/a><\/em><\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"the-anatomy-of-a-quishing-attack\">The Anatomy of a Quishing Attack<\/h2>\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"585\" src=\"https:\/\/qr.io\/blog\/wp-content\/uploads\/2024\/02\/quishing2-1024x585.jpg\" alt=\"\" class=\"wp-image-3783\" srcset=\"https:\/\/qr.io\/blog\/wp-content\/uploads\/2024\/02\/quishing2-1024x585.jpg 1024w, https:\/\/qr.io\/blog\/wp-content\/uploads\/2024\/02\/quishing2-300x172.jpg 300w, https:\/\/qr.io\/blog\/wp-content\/uploads\/2024\/02\/quishing2-768x439.jpg 768w, https:\/\/qr.io\/blog\/wp-content\/uploads\/2024\/02\/quishing2.jpg 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-33980f797305414c15a066f7b04633c5\">In a quishing attack, the cybercriminal crafts a malicious QR code. Upon being scanned, this code directs victims to a malicious website designed to mimic trusted services and prompt for sensitive information. <br><br>These counterfeit websites often appear legitimate, tricking the user into revealing their personal information without second thought.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-373ce162fec7aff0e887f350f0431a76\">Malicious QR codes, including fake QR codes, used in quishing attacks can be embedded in phishing emails, luring users into participating in bogus surveys or forms. These forms often offer non-existent rewards to entice personal detail disclosure.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-4e0d4ba5c9e845ca853b3ab949044a4c\">In some cases, scanning a quishing QR code can lead to actions like opening payment sites or sending pre-written emails from the victim\u2019s account, aiding attackers in impersonation and further targeting.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-6e7581fd86326b104bda2c213f51d3b9\">QR phishing, as a form of quishing, also involves urgent or emotional language and poor grammar, common clues in traditional phishing scams, accompanying QR codes in QR code scams. By understanding the tactics used in QR code phishing campaigns, users can better protect themselves from falling victim to these malicious activities.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-266a05fd41d42a9a47b87f8b5acaab19\"><em>Also see: <a href=\"https:\/\/qr.io\/blog\/what-is-a-qr-code-and-how-you-can-create-one\/\">What Is a QR Code and How You Can Create One<\/a><\/em><\/p>\n\n\n<h2 class=\"wp-block-heading has-black-color has-text-color has-link-color wp-elements-f0d15e0b93e774a1f8a16fd730bc1b59\" id=\"quishing-vs-smishing-and-vishing-comparing-social-engineering-techniques\">Quishing vs. Smishing and Vishing: Comparing Social Engineering Techniques<\/h2>\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-951bc983043e4f3b01f89e6afbd81b95\">Quishing, smishing, and vishing are all forms of social engineering attacks, with the major difference being in their delivery mechanisms. While quishing involves the misuse of QR codes, smishing leverages SMS or messaging apps, and vishing uses voice calls.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-e3260c4576e4c3268e49bc99295ba01f\">Smishing attacks often employ urgent language and malicious links that lead to fake websites designed to steal login credentials. Vishing, on the other hand, involves attackers using voice calls to personally interact with victims, often posing as trusted entities to extract sensitive information like credit card or social security numbers.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-a27c69058919db0f5efd0984757f6fad\">Both smishing and vishing commonly utilize an urgent tone to create a sense of immediacy, pressuring victims to act quickly and without scrutiny.<\/p>\n\n\n<h2 class=\"wp-block-heading has-black-color has-text-color has-link-color wp-elements-93a2417acfe4f23d379caa58815f036c\" id=\"dangers-of-falling-for-quishing-scams\">Dangers of Falling for Quishing Scams<\/h2>\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"585\" src=\"https:\/\/qr.io\/blog\/wp-content\/uploads\/2024\/02\/quishing3-1024x585.jpg\" alt=\"\" class=\"wp-image-3784\" srcset=\"https:\/\/qr.io\/blog\/wp-content\/uploads\/2024\/02\/quishing3-1024x585.jpg 1024w, https:\/\/qr.io\/blog\/wp-content\/uploads\/2024\/02\/quishing3-300x171.jpg 300w, https:\/\/qr.io\/blog\/wp-content\/uploads\/2024\/02\/quishing3-768x439.jpg 768w, https:\/\/qr.io\/blog\/wp-content\/uploads\/2024\/02\/quishing3.jpg 1050w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-886ce680ee0326fa7069de63a94dedd9\">Succumbing to quishing scams can lead to a range of serious repercussions. Unauthorized access by attackers into victims\u2019 financial accounts frequently results in monetary loss, with phishing attacks responsible for billions of dollars in organizational losses annually.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-c4baed91fdfbb926f6f984bfc6f99b42\">Quishing attacks may also trigger operational interruptions including system downtime, reduced productivity, and the suspension of online services.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-155c6c2d8456b80d7640cb15eb99e9c7\">These disruptions can damage an organization\u2019s reputation, erode consumer confidence, and potentially cause a decline in stock values.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-a5b2b73d9516ac4c19fa0555a7c95071\">Exploiting QR codes allows these scams to circumvent standard security measures, posing threats such as data breaches that expose sensitive information like user credentials or facilitating malware infections.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-86fa54c8a2e91ed1acfd2a8d070f250b\"><em>Also see: <a href=\"https:\/\/qr.io\/blog\/use-a-wifi-qr-code-generator-to-improve-your-customer-service\/\">Use a WiFi QR Code Generator to Improve Your Customer Service<\/a><\/em><\/p>\n\n\n<h2 class=\"wp-block-heading has-black-color has-text-color has-link-color wp-elements-63b78c2ba72b3e73e5142f58ee98c795\" id=\"strategies-to-detect-and-prevent-quishing-attacks\">Strategies to Detect and Prevent Quishing Attacks<\/h2>\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"457\" src=\"https:\/\/qr.io\/blog\/wp-content\/uploads\/2024\/02\/quishing4.jpg\" alt=\"\" class=\"wp-image-3785\" srcset=\"https:\/\/qr.io\/blog\/wp-content\/uploads\/2024\/02\/quishing4.jpg 800w, https:\/\/qr.io\/blog\/wp-content\/uploads\/2024\/02\/quishing4-300x171.jpg 300w, https:\/\/qr.io\/blog\/wp-content\/uploads\/2024\/02\/quishing4-768x439.jpg 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-444ba3a79bef1829e1f7e1a583dce0a0\">Adopting a multi-pronged defense strategy is a must in the fight against the escalating threat of quishing. This involves a combination of employee training and awareness, technological solutions, and robust policies and procedures.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-bccc0ada014f5d348fddcc3ae70726f9\">Together, these measures can provide a comprehensive defense strategy that minimizes the risk of falling victim to quishing attacks.<\/p>\n\n\n<h3 class=\"wp-block-heading has-black-color has-text-color has-link-color wp-elements-96fd61ed1613c0e11fbf10d51d56bd84\" id=\"employee-training-and-awareness\">Employee Training and Awareness<\/h3>\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-ded0c8f9f5b201e319561abdf82567f0\">Regular employee training and awareness can cultivate human vigilance, one of the strongest defenses against quishing attacks.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-52a7f130aacea73fb611c3a776ee42df\">Employees should be educated on the risks associated with scanning QR codes, teaching them how to detect suspicious emails and the proper actions to take without compromising sensitive information.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-278154fb563f6780b1c2c68ff7d95223\">Conducting simulated quishing attacks can prove highly beneficial, as it allows organizations to assess employee response and the effectiveness of security protocols. This hands-on approach facilitates improved defense strategies and quick response to threats.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-68626181a64080678f4a5e68f235f364\">Also, implementing <a href=\"https:\/\/www.qooper.io\/mentoring-software\">mentoring software<\/a> can enhance employee training programs by providing personalized guidance and support to help them navigate cybersecurity risks effectively.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-ebc5f616e997de384fa36d8be309e140\">Furthermore, fostering a supportive cybersecurity culture where employees are encouraged to report phishing incidents leverages human vigilance as an early warning system and underscores the recognition of collective defense accomplishments.<\/p>\n\n\n<h3 class=\"wp-block-heading has-black-color has-text-color has-link-color wp-elements-ea935457e3de334e88883e6256b4eea9\" id=\"technological-solutions\">Technological Solutions<\/h3>\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-168819989b4218f4bbac1dde67c17f86\">Technological solutions are another significant factor in defending against quishing, alongside human vigilance.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-66955a96792c16560fc9b83409da4ddd\">AI-based detection systems can evaluate additional signals like sender information, content, and image analysis, which traditional email filters may not effectively detect. These systems serve as a crucial tool in identifying quishing attempts, making <a href=\"https:\/\/www.rebeldot.com\/blog\/what-is-ai-readiness-and-how-to-run-ai-readiness-assessment\">AI readiness<\/a> essential for maximizing their effectiveness in your security strategy.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-1f55ca3d6c0fbe866151a351de9f9163\">Implementing technologies for authentication and verifying sender domains, such as DMARC, MFA, and SSO, can significantly bolster defenses against quishing.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-6d93c0acc55fd5292448d098228654e1\">Additionally, antivirus and cloud email security solutions can block or quarantine suspicious emails, with integrated smart algorithms analyzing content and context for additional protection.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-cc62bf93d4c2ad334fdd9a791fb8c436\">Real-time analysis and cloud-based protection services further aid in the immediate identification and resolution of quishing attacks, supporting a proactive and effective incident response.<\/p>\n\n\n<h3 class=\"wp-block-heading has-black-color has-text-color has-link-color wp-elements-5dc24bdb846dab45f55496538417d08c\" id=\"policy-and-procedures\">Policy and Procedures<\/h3>\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-6631a63fe9eb25c5a7076995915bfd77\">An organization\u2019s defense against quishing is fundamentally supported by its policies and procedures. Organizations should develop policies that ensure QR codes are strategically placed in easily accessible locations, considering safety, visibility from different angles, and availability of mobile network or Wi-Fi.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-2ece1c406824d620ebc35638285b58f5\">Moreover, QR codes in digital settings like websites should be meticulously optimized for a user-friendly experience, helping users transition smoothly from desktop to mobile device scanning via a QR code.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-6a4578e1098a330d0d77518912c62fc6\">Enhancing customer trust and engagement with QR codes can be achieved by incorporating brand elements such as logos and colors, with a direct call to action and a compelling explanation of their value. Utilizing a dynamic QR code can further improve this experience.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-581238c3a74829de90a147ca7263ffd3\">Policies should advocate for the use of UTM parameters for analytics tracking and personalization in QR code campaigns to gauge their effectiveness and customize the customer experience.<\/p>\n\n\n<h2 class=\"wp-block-heading has-black-color has-text-color has-link-color wp-elements-f2aa1effb18e98fc7a5b101416ea122c\" id=\"case-studies-reallife-quishing-incidents\">Case Studies: Real-Life Quishing Incidents<\/h2>\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-621b882771406d6bbea2871a624a6c42\">Examining real-life quishing incidents can provide a clearer picture of the potential severity and impact of these scams.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-fae5c4f519b852225ebbba4a0446711b\">For instance, tech giants Facebook and Google were defrauded of $100 million through fake invoices by an impostor of their vendor Quanta. Similarly, Crelan Bank in Belgium experienced a $75.8 million loss after a business email compromise involving an impersonator of a high-level executive.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-d04348963137a5aa0cc8b6a7a81ab577\">In another case, Austrian company FACC sent $61 million to a phisher who pretended to be the CEO, causing substantial financial damage. Ubiquiti Networks suffered a $46.7 million financial loss due to a BEC scam, where an attacker impersonated company executives.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-441fea003b890c1edb8ff2652b30ccbf\">And Upsher-Smith Laboratories was tricked into making multiple wire transfers totaling over $39 million, due to a scam involving a fake lawyer impersonating the CEO.<\/p>\n\n\n<h2 class=\"wp-block-heading has-black-color has-text-color has-link-color wp-elements-666de6665fdadac1972b2f9a777006ad\" id=\"best-practices-for-safe-qr-code-usage\">Best Practices for Safe QR Code Usage<\/h2>\n\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-cc62282ccbe8997e20b2e347241cdc1e\">Following best practices for safe QR code usage is crucial in protecting against quishing attacks. This involves a combination of personal vigilance, secure QR code generation, and regular security audits and updates.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-adf16de310cfe8e4ec66beaf3144f755\">These comprehensive measures can minimize the risk of falling victim to quishing scams.<\/p>\n\n\n<h3 class=\"wp-block-heading has-black-color has-text-color has-link-color wp-elements-ccaf6a1a3798c1d127cf97ade84b9c39\" id=\"personal-vigilance\">Personal Vigilance<\/h3>\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-531aa925f6fd8eedaed1142bebeaa84c\">In terms of safe QR code usage, personal vigilance is of utmost importance. Before scanning a QR code, it\u2019s crucial to pause and consider the source to avoid falling victim to quishing attacks.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-9582e6a9769f72f2c55147fd4e7b0c44\">Also, always inspect the physical appearance of QR codes for any signs of tampering, such as a sticker over the original code.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-6b0c9f5fba6d1ad52413bd9e83854797\">Using a dedicated QR code scanner app with additional security features can provide an extra layer of protection against fraudulent QR codes.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-e005c72a7da29f93c212db916e9cb3f8\">Before you scan QR codes, verify the URL and sender\u2019s legitimacy, hover over the code to check it, and watch out for suspicious domains or confirmation prompts to ensure safety.<\/p>\n\n\n<h3 class=\"wp-block-heading has-black-color has-text-color has-link-color wp-elements-2f7ce1b1c02639290f496f35cf109542\" id=\"secure-qr-code-generation\">Secure QR Code Generation<\/h3>\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-c0b88018222924adf15e80252bf90f0d\">Another key aspect of safe QR code usage is the secure generation of QR codes. Dynamic QR codes, which allow for the destination URL to be changed post-creation, aid in marketing campaigns and content updates without needing to generate a new QR code.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-54c942ce5e60619b0d680293f46ec2ef\">However, it\u2019s important to note that these dynamic codes can be exploited by scammers who may alter the intended destination to redirect users to malicious websites.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-f42dcbfa53fe16327411232422aa6ca5\">Customizing QR codes with distinctive branding elements, such as embedded logos, can help mitigate the risk of fraudulent copies. Using consistent branding features like specific colors and custom borders in QR code design enhances recognition, making it harder for scammers to create convincing duplicates.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-a0062dba31b7dd39145fb65fa211fbde\">All this you can achieve with our QR code generator, which offers unique features that will help you avoid quishing.<\/p>\n\n\n<h3 class=\"wp-block-heading has-black-color has-text-color has-link-color wp-elements-77e1f29fc09327a24c4d6c89f39256bb\" id=\"regular-security-audits-and-updates\">Regular Security Audits and Updates<\/h3>\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-f61d597fcf24b8cfc6211e1aa5c60eaf\">It is crucial to frequently perform security audits and apply updates as a defense mechanism against quishing attacks. These periodic evaluations are essential in maintaining the security of QR code systems by identifying and rectifying any weaknesses promptly.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-610831bf72282ee32ab8c5ce0240a59a\">Updating your device\u2019s software regularly mitigates the risks associated with potential exploits that can arise from scanning QR codes.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-c2af8f5c9a822e10285f2a25710cc4a8\">Verifying SSL\/TLS certificates on websites connected to QR codes helps in safeguarding users from being navigated towards harmful webpages. Such thorough strategies ensure that all possible areas of susceptibility are considered, offering an all-encompassing approach for secure utilization of QR codes.<\/p>\n\n\n<h2 class=\"wp-block-heading has-black-color has-text-color has-link-color wp-elements-524384ef7a4a11742df2d054208e3870\" id=\"faqs\">FAQs<\/h2>\n\n<h3 class=\"wp-block-heading has-black-color has-text-color has-link-color wp-elements-d17fc82d078229245f4e67cbd7e8acd3\" id=\"what-is-an-example-of-quishing-in-social-engineering\">What is an example of quishing in social engineering?<\/h3>\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-0696844afc30a6c3f827e9daa35880c2\">An example of quishing in social engineering is when attackers use QR codes as plain images in emails to bypass filters and deceive victims into falling for their tactics.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-26aab34f164909b3cc35e524ed0c4713\">This can lead to compromised security and potential data breaches.<\/p>\n\n\n<h3 class=\"wp-block-heading has-black-color has-text-color has-link-color wp-elements-fca32cacd956ade5b38543b8b273c59f\" id=\"is-quishing-the-new-phishing\">Is quishing the new phishing?<\/h3>\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-28b282e2597632e96608cb11529807f9\">Recent research from Perception Point has revealed that between August and September 2023, there was an alarming surge in quishing attacks\u2014specifically a 427% rise\u2014which signals an escalating trend in this particular type of cyber threat.<\/p>\n\n\n<h3 class=\"wp-block-heading has-black-color has-text-color has-link-color wp-elements-32076adc84201a95dc06d00ab8bebc2b\" id=\"what-is-quishing\">What is quishing?<\/h3>\n\n\n<p>Phishing attacks that utilize QR codes to lure individuals into accessing a harmful website or downloading a document infected with malware are known as \u201cquishing.\u201d This form of cybersecurity menace involves attackers employing QR codes as conduits to direct unsuspecting users towards dangerous digital material.<\/p>\n\n\n<h3 class=\"wp-block-heading has-black-color has-text-color has-link-color wp-elements-15f0bb55463e9e837ec5520bc9ea14f3\" id=\"how-does-a-quishing-attack-work\">How does a quishing attack work?<\/h3>\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-4dbe803b7fc5454883accee52b7656fd\">During a quishing attack, perpetrators employ fraudulent QR codes to steer individuals toward counterfeit websites that resemble reputable platforms in order to harvest confidential data.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-adbd23ffcc859e9971c0b6bae18330be\">Exercise vigilance while scanning QR codes originating from sources that have not been verified as trustworthy.<\/p>\n\n\n<h3 class=\"wp-block-heading has-black-color has-text-color has-link-color wp-elements-c13b66f61e677bbf5ca1bcf8f0e649c8\" id=\"what-are-some-strategies-to-detect-and-prevent-quishing-attacks\">What are some strategies to detect and prevent quishing attacks?<\/h3>\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-298926d4ea368d8bfb8f01860447f385\">It\u2019s essential to employ a mix of workforce education, technology-based defenses, and strong protocols for the detection and thwarting of quishing attacks.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-4605a33cb0aee4a4afef6bde4d8a59a8\">Consistent awareness programs and instruction are key in enabling staff members to recognize and alert authorities about possible quishing threats.<\/p>\n\n\n<h2 class=\"wp-block-heading has-black-color has-text-color has-link-color wp-elements-99ee80b7135cde494f9fc389547b43da\" id=\"wrapup\">Wrap-Up<\/h2>\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-48add8c9078005945eef889fdbe44db8\">In summary, quishing is a growing cybersecurity threat that exploits the convenience of QR codes to deceive individuals and organizations. Understanding its mechanics, recognizing its potential damages, and adopting a robust defense strategy are crucial in preventing these scams.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-3a179627114e06a9a3a9e86ddccf918e\">By fostering employee awareness, employing technological solutions, establishing robust policies, and adhering to safe QR code usage practices, we can minimize the risks and safeguard our digital environment. Let\u2019s stay informed, vigilant, and proactive in our fight against quishing.<\/p>\n<!-- AddThis Advanced Settings generic via filter on the_content --><!-- AddThis Share Buttons generic via filter on the_content -->","protected":false},"excerpt":{"rendered":"<p>Have you ever scanned a QR code and wondered if it\u2019s safe? With quishing\u2014fraudulent use of QR codes\u2014lurking online, it\u2019s [&hellip;]<!-- AddThis Advanced Settings generic via filter on get_the_excerpt --><!-- AddThis Share Buttons generic via filter on get_the_excerpt --><\/p>\n","protected":false},"author":1,"featured_media":3782,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[14,43],"class_list":["post-3779","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-qr-code-world","tag-dynamic-qr-code","tag-qr-code-use"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Quishing Alert: How to Spot and Thwart QR Code Phishing Scams | QR.io Blog<\/title>\n<meta name=\"description\" content=\"Quishing, also known as QR phishing, is a cybersecurity peril where criminals exploit QR codes to steer victims towards malicious websites.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/qr.io\/blog\/quishing-alert-how-to-spot-and-thwart-qr-code-phishing-scams\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Quishing Alert: How to Spot and Thwart QR Code Phishing Scams | QR.io Blog\" \/>\n<meta property=\"og:description\" content=\"Quishing, also known as QR phishing, is a cybersecurity peril where criminals exploit QR codes to steer victims towards malicious websites.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/qr.io\/blog\/quishing-alert-how-to-spot-and-thwart-qr-code-phishing-scams\/\" \/>\n<meta property=\"og:site_name\" content=\"QR.io Blog\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-08T08:26:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-21T15:00:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/qr.io\/blog\/wp-content\/uploads\/2024\/02\/quishing.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"857\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"qrio\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"qrio\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/qr.io\\\/blog\\\/quishing-alert-how-to-spot-and-thwart-qr-code-phishing-scams\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/qr.io\\\/blog\\\/quishing-alert-how-to-spot-and-thwart-qr-code-phishing-scams\\\/\"},\"author\":{\"name\":\"qrio\",\"@id\":\"https:\\\/\\\/qr.io\\\/blog\\\/#\\\/schema\\\/person\\\/446740cc7d5f7be28eff0c405fde3300\"},\"headline\":\"Quishing Alert: How to Spot and Thwart QR Code Phishing Scams\",\"datePublished\":\"2024-02-08T08:26:00+00:00\",\"dateModified\":\"2025-04-21T15:00:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/qr.io\\\/blog\\\/quishing-alert-how-to-spot-and-thwart-qr-code-phishing-scams\\\/\"},\"wordCount\":1964,\"publisher\":{\"@id\":\"https:\\\/\\\/qr.io\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/qr.io\\\/blog\\\/quishing-alert-how-to-spot-and-thwart-qr-code-phishing-scams\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/qr.io\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/quishing.jpg\",\"keywords\":[\"Dynamic QR Code\",\"QR Code Use\"],\"articleSection\":[\"QR Code World\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/qr.io\\\/blog\\\/quishing-alert-how-to-spot-and-thwart-qr-code-phishing-scams\\\/\",\"url\":\"https:\\\/\\\/qr.io\\\/blog\\\/quishing-alert-how-to-spot-and-thwart-qr-code-phishing-scams\\\/\",\"name\":\"Quishing Alert: How to Spot and Thwart QR Code Phishing Scams | QR.io Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/qr.io\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/qr.io\\\/blog\\\/quishing-alert-how-to-spot-and-thwart-qr-code-phishing-scams\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/qr.io\\\/blog\\\/quishing-alert-how-to-spot-and-thwart-qr-code-phishing-scams\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/qr.io\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/quishing.jpg\",\"datePublished\":\"2024-02-08T08:26:00+00:00\",\"dateModified\":\"2025-04-21T15:00:50+00:00\",\"description\":\"Quishing, also known as QR phishing, is a cybersecurity peril where criminals exploit QR codes to steer victims towards malicious websites.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/qr.io\\\/blog\\\/quishing-alert-how-to-spot-and-thwart-qr-code-phishing-scams\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/qr.io\\\/blog\\\/quishing-alert-how-to-spot-and-thwart-qr-code-phishing-scams\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/qr.io\\\/blog\\\/quishing-alert-how-to-spot-and-thwart-qr-code-phishing-scams\\\/#primaryimage\",\"url\":\"https:\\\/\\\/qr.io\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/quishing.jpg\",\"contentUrl\":\"https:\\\/\\\/qr.io\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/quishing.jpg\",\"width\":1500,\"height\":857},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/qr.io\\\/blog\\\/quishing-alert-how-to-spot-and-thwart-qr-code-phishing-scams\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/qr.io\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Quishing Alert: How to Spot and Thwart QR Code Phishing Scams\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/qr.io\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/qr.io\\\/blog\\\/\",\"name\":\"QR.io Blog\",\"description\":\"Learn more about QR Codes\",\"publisher\":{\"@id\":\"https:\\\/\\\/qr.io\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/qr.io\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/qr.io\\\/blog\\\/#organization\",\"name\":\"QR.io\",\"url\":\"https:\\\/\\\/qr.io\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/qr.io\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/qr.io\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/logo.png\",\"contentUrl\":\"https:\\\/\\\/qr.io\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/logo.png\",\"width\":408,\"height\":408,\"caption\":\"QR.io\"},\"image\":{\"@id\":\"https:\\\/\\\/qr.io\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/qr.io\\\/blog\\\/#\\\/schema\\\/person\\\/446740cc7d5f7be28eff0c405fde3300\",\"name\":\"qrio\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f3403a72a15841a9328cabcdd480f2ccd32b5f130a5a502bad00f5db25ea2dc2?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f3403a72a15841a9328cabcdd480f2ccd32b5f130a5a502bad00f5db25ea2dc2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f3403a72a15841a9328cabcdd480f2ccd32b5f130a5a502bad00f5db25ea2dc2?s=96&d=mm&r=g\",\"caption\":\"qrio\"},\"sameAs\":[\"https:\\\/\\\/qr.io\\\/blog\"],\"url\":\"https:\\\/\\\/qr.io\\\/blog\\\/author\\\/qrio\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Quishing Alert: How to Spot and Thwart QR Code Phishing Scams | QR.io Blog","description":"Quishing, also known as QR phishing, is a cybersecurity peril where criminals exploit QR codes to steer victims towards malicious websites.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/qr.io\/blog\/quishing-alert-how-to-spot-and-thwart-qr-code-phishing-scams\/","og_locale":"en_US","og_type":"article","og_title":"Quishing Alert: How to Spot and Thwart QR Code Phishing Scams | QR.io Blog","og_description":"Quishing, also known as QR phishing, is a cybersecurity peril where criminals exploit QR codes to steer victims towards malicious websites.","og_url":"https:\/\/qr.io\/blog\/quishing-alert-how-to-spot-and-thwart-qr-code-phishing-scams\/","og_site_name":"QR.io Blog","article_published_time":"2024-02-08T08:26:00+00:00","article_modified_time":"2025-04-21T15:00:50+00:00","og_image":[{"width":1500,"height":857,"url":"https:\/\/qr.io\/blog\/wp-content\/uploads\/2024\/02\/quishing.jpg","type":"image\/jpeg"}],"author":"qrio","twitter_card":"summary_large_image","twitter_misc":{"Written by":"qrio","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/qr.io\/blog\/quishing-alert-how-to-spot-and-thwart-qr-code-phishing-scams\/#article","isPartOf":{"@id":"https:\/\/qr.io\/blog\/quishing-alert-how-to-spot-and-thwart-qr-code-phishing-scams\/"},"author":{"name":"qrio","@id":"https:\/\/qr.io\/blog\/#\/schema\/person\/446740cc7d5f7be28eff0c405fde3300"},"headline":"Quishing Alert: How to Spot and Thwart QR Code Phishing Scams","datePublished":"2024-02-08T08:26:00+00:00","dateModified":"2025-04-21T15:00:50+00:00","mainEntityOfPage":{"@id":"https:\/\/qr.io\/blog\/quishing-alert-how-to-spot-and-thwart-qr-code-phishing-scams\/"},"wordCount":1964,"publisher":{"@id":"https:\/\/qr.io\/blog\/#organization"},"image":{"@id":"https:\/\/qr.io\/blog\/quishing-alert-how-to-spot-and-thwart-qr-code-phishing-scams\/#primaryimage"},"thumbnailUrl":"https:\/\/qr.io\/blog\/wp-content\/uploads\/2024\/02\/quishing.jpg","keywords":["Dynamic QR Code","QR Code Use"],"articleSection":["QR Code World"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/qr.io\/blog\/quishing-alert-how-to-spot-and-thwart-qr-code-phishing-scams\/","url":"https:\/\/qr.io\/blog\/quishing-alert-how-to-spot-and-thwart-qr-code-phishing-scams\/","name":"Quishing Alert: How to Spot and Thwart QR Code Phishing Scams | QR.io Blog","isPartOf":{"@id":"https:\/\/qr.io\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/qr.io\/blog\/quishing-alert-how-to-spot-and-thwart-qr-code-phishing-scams\/#primaryimage"},"image":{"@id":"https:\/\/qr.io\/blog\/quishing-alert-how-to-spot-and-thwart-qr-code-phishing-scams\/#primaryimage"},"thumbnailUrl":"https:\/\/qr.io\/blog\/wp-content\/uploads\/2024\/02\/quishing.jpg","datePublished":"2024-02-08T08:26:00+00:00","dateModified":"2025-04-21T15:00:50+00:00","description":"Quishing, also known as QR phishing, is a cybersecurity peril where criminals exploit QR codes to steer victims towards malicious websites.","breadcrumb":{"@id":"https:\/\/qr.io\/blog\/quishing-alert-how-to-spot-and-thwart-qr-code-phishing-scams\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/qr.io\/blog\/quishing-alert-how-to-spot-and-thwart-qr-code-phishing-scams\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/qr.io\/blog\/quishing-alert-how-to-spot-and-thwart-qr-code-phishing-scams\/#primaryimage","url":"https:\/\/qr.io\/blog\/wp-content\/uploads\/2024\/02\/quishing.jpg","contentUrl":"https:\/\/qr.io\/blog\/wp-content\/uploads\/2024\/02\/quishing.jpg","width":1500,"height":857},{"@type":"BreadcrumbList","@id":"https:\/\/qr.io\/blog\/quishing-alert-how-to-spot-and-thwart-qr-code-phishing-scams\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/qr.io\/blog\/"},{"@type":"ListItem","position":2,"name":"Quishing Alert: How to Spot and Thwart QR Code Phishing Scams"}]},{"@type":"WebSite","@id":"https:\/\/qr.io\/blog\/#website","url":"https:\/\/qr.io\/blog\/","name":"QR.io Blog","description":"Learn more about QR Codes","publisher":{"@id":"https:\/\/qr.io\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/qr.io\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/qr.io\/blog\/#organization","name":"QR.io","url":"https:\/\/qr.io\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/qr.io\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/qr.io\/blog\/wp-content\/uploads\/2022\/06\/logo.png","contentUrl":"https:\/\/qr.io\/blog\/wp-content\/uploads\/2022\/06\/logo.png","width":408,"height":408,"caption":"QR.io"},"image":{"@id":"https:\/\/qr.io\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/qr.io\/blog\/#\/schema\/person\/446740cc7d5f7be28eff0c405fde3300","name":"qrio","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/f3403a72a15841a9328cabcdd480f2ccd32b5f130a5a502bad00f5db25ea2dc2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f3403a72a15841a9328cabcdd480f2ccd32b5f130a5a502bad00f5db25ea2dc2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f3403a72a15841a9328cabcdd480f2ccd32b5f130a5a502bad00f5db25ea2dc2?s=96&d=mm&r=g","caption":"qrio"},"sameAs":["https:\/\/qr.io\/blog"],"url":"https:\/\/qr.io\/blog\/author\/qrio\/"}]}},"_links":{"self":[{"href":"https:\/\/qr.io\/blog\/wp-json\/wp\/v2\/posts\/3779","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/qr.io\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/qr.io\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/qr.io\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/qr.io\/blog\/wp-json\/wp\/v2\/comments?post=3779"}],"version-history":[{"count":10,"href":"https:\/\/qr.io\/blog\/wp-json\/wp\/v2\/posts\/3779\/revisions"}],"predecessor-version":[{"id":4372,"href":"https:\/\/qr.io\/blog\/wp-json\/wp\/v2\/posts\/3779\/revisions\/4372"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/qr.io\/blog\/wp-json\/wp\/v2\/media\/3782"}],"wp:attachment":[{"href":"https:\/\/qr.io\/blog\/wp-json\/wp\/v2\/media?parent=3779"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/qr.io\/blog\/wp-json\/wp\/v2\/categories?post=3779"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/qr.io\/blog\/wp-json\/wp\/v2\/tags?post=3779"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}