Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News

      ‘System offline’ scourge to end, says Schreiber – but industry must pay

      23 June 2025

      Why the spectrum gold rush may soon be over

      23 June 2025

      Tech stability key to getting South Africa off damaging financial grey list

      23 June 2025

      Naspers shifts to an AI-first strategy – and it’s paying off

      23 June 2025

      Letter: South Africa risks missing AI wave while world surges ahead

      23 June 2025
    • World

      Watch | Starship rocket explodes in setback to Musk’s Mars mission

      19 June 2025

      Trump Mobile dials into politics, profit and patriarchy

      17 June 2025

      Samsung plots health data hub to link users and doctors in real time

      17 June 2025

      Beijing’s chip champions blacklisted by Taiwan

      16 June 2025

      China is behind in AI chips – but for how much longer?

      13 June 2025
    • In-depth

      Meta bets $72-billion on AI – and investors love it

      17 June 2025

      MultiChoice may unbundle SuperSport from DStv

      12 June 2025

      Grok promised bias-free chat. Then came the edits

      2 June 2025

      Digital fortress: We go inside JB5, Teraco’s giant new AI-ready data centre

      30 May 2025

      Sam Altman and Jony Ive’s big bet to out-Apple Apple

      22 May 2025
    • TCS

      TechCentral Nexus S0E3: Behind Takealot’s revenue surge

      23 June 2025

      TCS | South Africa’s Sociable wants to make social media social again

      23 June 2025

      TCS+ | AfriGIS’s Helen Hulett on how tech can help resolve South Africa’s water crisis

      18 June 2025

      TechCentral Nexus S0E2: South Africa’s digital battlefield

      16 June 2025

      TechCentral Nexus S0E1: Starlink, BEE and a new leader at Vodacom

      8 June 2025
    • Opinion

      South Africa pioneered drone laws a decade ago – now it must catch up

      17 June 2025

      AI and the future of ICT distribution

      16 June 2025

      Singapore soared – why can’t we? Lessons South Africa refuses to learn

      13 June 2025

      Beyond the box: why IT distribution depends on real partnerships

      2 June 2025

      South Africa’s next crisis? Being offline in an AI-driven world

      2 June 2025
    • Company Hubs
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • AvertITD
      • Braintree
      • CallMiner
      • CambriLearn
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • Incredible Business
      • iONLINE
      • Iris Network Systems
      • LSD Open
      • NEC XON
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SevenC
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Tenable
      • Vertiv
      • Videri Digital
      • Wipro
      • Workday
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Fintech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Public sector
      • Retail and e-commerce
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » News » How QR codes work – and what makes them dangerous

    How QR codes work – and what makes them dangerous

    Among the many changes brought about by the pandemic is the widespread use of QR codes. But be wary of them.
    By The Conversation13 December 2023
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp

    Among the many changes brought about by the pandemic is the widespread use of QR codes, graphical representations of digital data that can be printed and later scanned by a smartphone or other device, but there are some security risks. The Federal Trade Commission warned again this month about the danger of scanning a code from an unknown source.

    QR codes have a wide range of uses that help people avoid contact with objects and close interactions with other people, including for sharing restaurant menus, e-mail list sign-ups, car and home sales information, and checking in and out of medical and professional appointments.

    QR codes are a close cousin of the barcodes on product packaging that cashiers scan with infrared scanners to let the checkout computer know what products are being purchased.

    Barcodes store information along one axis, horizontally. QR codes store information in both vertical and horizontal axes, which allows them to hold significantly more data. That extra amount of data is what makes QR codes so versatile.

    Anatomy of a QR code

    While it is easy for people to read Arabic numerals, it is hard for a computer. Barcodes encode alphanumeric data as a series of black and white lines of various widths. At the store, barcodes record the set of numbers that specify a product’s ID. Critically, data stored in barcodes is redundant. Even if part of the barcode is destroyed or obscured, it is still possible for a device to read the product ID.

    QR codes are designed to be scanned using a camera, such as those found on your smartphone. QR code scanning is built into many camera apps for Android and iOS. QR codes are most often used to store web links; however, they can store arbitrary data, such as text or images.

    When you scan a QR code, the QR reader in your phone’s camera deciphers the code, and the resulting information triggers an action on your phone. If the QR code holds a URL, your phone will present you with the URL. Tap it, and your phone’s default browser will open the webpage.

    QR codes are composed of several parts: data, position markers, quiet zone and optional logos.

    The data in a QR code is a series of dots in a square grid. Each dot represents a one and each blank a zero in binary code, and the patterns encode sets of numbers, letters or both, including URLs. At its smallest this grid is 21 rows by 21 columns, and at its largest it is 177 rows by 177 columns. In most cases, QR codes use black squares on a white background, making the dots easy to distinguish. However, this is not a strict requirement, and QR codes can use any colour or shape for the dots and background.

    Position markers are squares placed in a QR code’s top left, top right and bottom left corners. These markers let a smartphone camera or other device orient the QR code when scanning it. QR codes are surrounded by blank space, the quiet zone, to help the computer determine where the QR code begins and ends. QR codes can include an optional logo in the middle.

    Read: The barcode at 50: how it changed the world

    Like bar codes, QR codes are designed with data redundancy. Even if as much as 30% of the QR code is destroyed or difficult to read, the data can still be recovered. In fact, logos are not actually part of the QR code; they cover up some of the QR code’s data. However, due to the QR code’s redundancy, the data represented by these missing dots can be recovered by looking at the remaining visible dots.

    Are QR codes dangerous?

    QR codes are not inherently dangerous. They are simply a way to store data. However, just as it can be hazardous to click links in e-mails, visiting URLs stored in QR codes can also be risky in several ways.

    The QR code’s URL can take you to a phishing website that tries to trick you into entering your username or password for another website. The URL could take you to a legitimate website and trick that website into doing something harmful, such as giving an attacker access to your account. While such an attack requires a flaw in the website you are visiting, such vulnerabilities are common on the internet. The URL can take you to a malicious website that tricks another website you are logged into on the same device to take an unauthorized action.

    When you open a link in a QR code, ensure that the URL is safe and comes from a trusted source

    A malicious URL could open an application on your device and cause it to take some action. Maybe you’ve seen this behaviour when you clicked a Zoom link, and the Zoom application opened and automatically joined a meeting. While such behaviour is ordinarily benign, an attacker could use this to trick some apps into revealing your data.

    It is critical that when you open a link in a QR code, you ensure that the URL is safe and comes from a trusted source. Just because the QR code has a logo you recognise doesn’t mean you should click on the URL it contains.

    There is also a slight chance that the app used to scan the QR code could contain a vulnerability that allows malicious QR codes to take over your device. This attack would succeed by just scanning the QR code, even if you don’t click the link stored in it. To avoid this threat, you should use trusted apps provided by the device manufacturer to scan QR codes and avoid downloading custom QR code apps.The Conversation

    • The author, Scott Ruoti, is assistant professor of computer science, University of Tennessee
    • This article is republished from The Conversation under a Creative Commons licence

    Get breaking news alerts from TechCentral on WhatsApp



    Subscribe to TechCentral Subscribe to TechCentral
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleWhat 2024 holds in store for Wi-Fi in South Africa
    Next Article Social grants in South Africa are going cashless

    Related Posts

    ‘System offline’ scourge to end, says Schreiber – but industry must pay

    23 June 2025

    Why the spectrum gold rush may soon be over

    23 June 2025

    Tech stability key to getting South Africa off damaging financial grey list

    23 June 2025
    Company News

    IoT connectivity management in South Africa – expert insights

    23 June 2025

    Let’s reimagine Joburg using the power of tech, data and AI

    23 June 2025

    Netstar doubles down on global markets while backing SA growth

    23 June 2025
    Opinion

    South Africa pioneered drone laws a decade ago – now it must catch up

    17 June 2025

    AI and the future of ICT distribution

    16 June 2025

    Singapore soared – why can’t we? Lessons South Africa refuses to learn

    13 June 2025

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    © 2009 - 2025 NewsCentral Media

    Type above and press Enter to search. Press Esc to cancel.