Business
Focused
Technology

Payment Fraud Moves to the Real World with Fake QR Codes on Parking Meters

Scammers are using the professional-looking stickers to point those parking to an alternate pay site to collect credit card details in the perfect situation where victims would be none the wiser.

This is a pretty slick scam – you park your car, don’t have enough change, see the “Pay Here” QR Code, scan it, and are taking to the friendly-looking parking payment website. You’d obviously pay without hesitation. But according to Austin Police, this parking meter scam popped up beginning in December and appears to be continuing its’ paces.

In one way, this is the ultimate impersonation scam – the scammer gets the legitimacy bump from the parking meter itself! The closest we have to this in the world of cyberattacks is when vendor email compromise takes place and a malicious email is sent from the hijacked account.

What’s also concerning about this kind of scam is that scams are moving from online into the real world. You could see this happening, for example, outside a major department store with a sign promoting a giveaway using a QR code pointing to a brand-impersonated site.

Source: Austin Police Department

But, because these scams tie back to online habits, the good news is proper Security Awareness Training can be put into practice, teaching users to always be mindful and vigilant whenever payments, credentials, or personal details are involved online.


Source: KnowBe4

Partner, Law Firm

We hired IT360 as our computer hardware and software computer consultants when the company first went into business. Since then, they have helped us purchase new software and hardware equipment that we have instituted into the law firm. Any time we needed them to be there they have been. They have solved all of our problems including: stand alone computers, networking issues, Internet access issues, and software. I would highly recommend IT360 to anybody who needs help in these areas.

Partner, Law Firm

Recent
Technology News

IT 360 News
Threats and Infrastructure

From Arctic Wolf SUMMARY On February 7, 2024, CISA issued an advisory detailing their discoveries concerning state-sponsored cyber actors linked to the People’s Republic of China (PRC). Notably, the PRC-affiliated threat actor, Volt Typhoon, is actively engaged in efforts to infiltrate IT networks, with the potential aim of launching cyberattacks on vital U.S. infrastructure in […]

Read more
IT 360 News
Multi-Factor Authentication

By Cybersecurity & Infrastructure Security Agency OVERVIEW Multi-factor authentication (MFA) is a layered approach to securing physical and logical access where a system requires a user to present a combination of two or more different authenticators to verify a user’s identity for login. MFA increases security because even if one authenticator becomes compromised, unauthorized users […]

Read more