{"id":4267,"date":"2025-04-09T09:07:43","date_gmt":"2025-04-09T08:07:43","guid":{"rendered":"https:\/\/ki-acora.s.nomatter.dev\/one\/?p=4267"},"modified":"2025-04-09T09:07:43","modified_gmt":"2025-04-09T08:07:43","slug":"understanding-quishing-qr-code-phishing-attacks","status":"publish","type":"post","link":"https:\/\/ki-acora.s.nomatter.dev\/one\/news\/article\/understanding-quishing-qr-code-phishing-attacks\/","title":{"rendered":"Understanding Quishing: QR Code Phishing Attacks"},"content":{"rendered":"<p data-pm-slice=\"1 1 []\">Quick Response (QR) codes have become ubiquitous, offering a seamless bridge between the physical and digital realms. From restaurant menus to payment portals, these pixelated squares provide instant access to information with a simple scan.<\/p>\n<p>However, this convenience has also paved the way for a new cyber threat known as &#8220;<strong>quishing.<\/strong>&#8221; This article delves into the intricacies of quishing, highlighting its dangers, real-world instances, and strategies to protect against such schemes.\u200b<\/p>\n<p>&nbsp;<\/p>\n<h3>What is Quishing: A Look at QR Code Scams<\/h3>\n<p>A QR code is a two-dimensional barcode capable of storing a vast array of data, including URLs, text, and other information.\u00a0Originally developed in 1994 by Denso Wave, a Japanese automotive company, QR codes were designed to track vehicles during manufacturing.<\/p>\n<p>Today, they\u2019ve permeated various sectors, appearing in advertisements, product packaging, event tickets, and more, due to their efficiency and user-friendliness.\u00a0By scanning a QR code with a smartphone or dedicated scanner, users can swiftly access embedded data without the hassle of manually entering web addresses or searching for information.<\/p>\n<p>However, cybercriminals are creating QR codes as part of their quishing attacks, using them to trick victims into visiting fraudulent websites or downloading malicious files.\u00a0Cybercriminals are also leveraging QR codes in phishing schemes, tricking victims into providing sensitive information like login credentials and credit card details through deceptive social engineering tactics.<\/p>\n<p>&nbsp;<\/p>\n<h3>Types of QR Codes<\/h3>\n<p><strong>Static QR Code<\/strong><\/p>\n<p>There are two main types of QR codes: static and dynamic. Static QR codes are fixed and cannot be altered once created, making them suitable for sharing unchanging information like a website URL or contact details.<\/p>\n<p><strong>Dynamic QR Codes<\/strong><\/p>\n<p>On the other hand, dynamic QR codes offer more flexibility. The data they store can be updated or changed without altering the code\u2019s appearance. This makes dynamic QR codes ideal for situations where the content needs to be updated frequently, such as event details or promotional offers. The ability to modify the stored information without changing the QR code itself adds a layer of convenience and adaptability.<\/p>\n<p><strong>How QR Codes Work<\/strong><\/p>\n<p>QR codes work by storing data in a series of black squares arranged on a white background in a square grid. When you scan a QR code using a smartphone or barcode scanner, the device decodes the pattern and displays the embedded information, such as a URL or contact details.<\/p>\n<p>This technology is used in various applications, including advertising, ticketing, authentication, and inventory management. The simplicity and efficiency of scanning a QR code make it a popular choice for quickly accessing and sharing information.<\/p>\n<p>&nbsp;<\/p>\n<h3>Defining Quishing<\/h3>\n<p>Quishing, a portmanteau of &#8220;QR&#8221; and &#8220;phishing,&#8221; refers to cyberattacks where malicious actors employ fraudulent QR codes to deceive individuals into revealing sensitive information or downloading harmful software.<\/p>\n<p>These deceptive QR codes can be embedded in emails, displayed on websites, or physically placed in public areas, leading unsuspecting users to malicious websites designed to steal personal data or install malware on their devices.<\/p>\n<p>The concealed nature of QR codes means users often cannot discern the destination URL before scanning, making it easier for attackers to mask their malicious intentions.\u200b<\/p>\n<p>&nbsp;<\/p>\n<h3>The Dangers of Malicious QR Codes in Quishing<\/h3>\n<p>The primary danger of quishing lies in its exploitation of the inherent trust and convenience associated with QR codes, making it a sophisticated form of phishing attack.<\/p>\n<p>Unlike traditional phishing attacks that rely on suspicious links or attachments, quishing leverages QR codes\u2019 visual simplicity to mask malicious intentions.<\/p>\n<p>Users, accustomed to scanning QR codes without hesitation, may inadvertently expose themselves to cyber threats.<\/p>\n<p>Potential consequences include:\u200b<\/p>\n<ul>\n<li><strong>Data Theft<\/strong>: Users may be directed to counterfeit websites resembling legitimate platforms, prompting them to enter personal information, login credentials, or financial details.\u200b<\/li>\n<li><strong>Malware Installation<\/strong>: Scanning a malicious QR code can trigger the download of malware onto the user\u2019s device, compromising security and potentially leading to data loss or unauthorized access.\u200b<\/li>\n<li><strong>Financial Loss<\/strong>: Some quishing attacks aim to facilitate unauthorized financial transactions, leading to direct monetary losses for victims.\u200b<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h3>Real-World Examples of QR Code Phishing Attacks<\/h3>\n<p>Quishing is not a mere theoretical threat; several real-world incidents underscore the potential impact of qr phishing:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.bbc.co.uk\/news\/articles\/cx276qevpg6o\"><strong>Parking Meter Scams<\/strong>:<\/a> Unsuspecting drivers who scanned these codes were directed to fraudulent payment portals, resulting in stolen payment information and unauthorised transactions. \u200b<\/li>\n<li><strong>Airline Boarding Pass Scams<\/strong>: As airlines adopted contactless boarding, qr phishing attacks on boarding passes became more common. Hackers can distribute fake QR codes on boarding passes, leading travelers to phishing sites designed to look like official airline check-in portals.<\/li>\n<li><strong>COVID-19 Vaccination Campaigns<\/strong>: Attackers have been known to replace QR codes on public posters promoting COVID-19 vaccination campaigns. The fraudulent codes directed users to malicious sites that harvested personal health information.<\/li>\n<li><strong>Fake Delivery Service Emails<\/strong>: Individuals received emails purportedly from delivery services, containing QR codes to \u201ctrack packages.\u201d Scanning the code led to phishing sites that harvested personal information. \u200b<\/li>\n<\/ul>\n<h3><strong>Common Scenarios Where Quishing Occurs<\/strong><\/h3>\n<p>Quishing attacks can manifest in various settings:\u200b<\/p>\n<ul>\n<li><strong>Emails<\/strong>: Phishers embed malicious QR codes in emails, enticing recipients with offers, security alerts, or package delivery notices.\u200b<\/li>\n<li><strong>Physical Flyers and Posters<\/strong>: Fraudulent QR codes are placed on promotional materials in public spaces, leading scanners to malicious sites.\u200b<\/li>\n<li><strong>Business Cards<\/strong>: Scammers distribute business cards with QR codes that, when scanned, direct users to phishing websites or initiate malware downloads.\u200b<\/li>\n<li><strong>Public Places<\/strong>: Attackers place counterfeit QR code stickers over legitimate QR codes in locations like restaurants, parking meters, and public transport stations.\u200b<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h3>Tips to Avoid Falling for Quishing Schemes When Scanning QR Codes<\/h3>\n<p>To safeguard against quishing attacks, consider the following precautions:<\/p>\n<ol>\n<li><strong>Verify the Source<\/strong>: Before scanning a QR code, ensure it originates from a trusted source. If in doubt, avoid scanning.\u200b<\/li>\n<li><strong>Use QR Scanner Apps with Previews<\/strong>: Opt for QR scanner applications that display the URL before opening, allowing you to assess its legitimacy.\u200b<\/li>\n<li><strong>Be Cautious with Emails<\/strong>: Exercise caution with unsolicited emails containing QR codes, especially those urging immediate action.\u200b<\/li>\n<li><strong>Inspect Physical QR Codes<\/strong>: Before scanning, check for signs of tampering, such as stickers placed over original codes.\u200b<\/li>\n<li><strong>Keep Devices Updated<\/strong>: Regularly update your device&#8217;s operating system and security software to protect against known vulnerabilities.\u200b<\/li>\n<li><strong>Educate Yourself and Others<\/strong>: Stay informed about the latest phishing tactics and share this knowledge to foster a culture of cybersecurity awareness.\u200b<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p><strong>Conclusion<\/strong><\/p>\n<p>While QR codes offer undeniable convenience, it&#8217;s essential to approach them with caution in an era where cyber threats are increasingly sophisticated.\u00a0By understanding the nature of quishing and implementing proactive security measures, individuals and organizations can mitigate the risks associated with this emerging threat.<\/p>\n<p><em><strong>Vigilance and education are paramount in navigating the digital landscape safely.<\/strong><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Quick Response (QR) codes have become ubiquitous, offering a seamless bridge between the physical and digital realms. From restaurant menus to payment portals, these pixelated squares provide instant access to information with a simple scan. However, this convenience has also&#8230;<\/p>\n","protected":false},"author":16,"featured_media":4268,"comment_status":"closed","ping_status":"open","sticky":false,"template":"full-width-single-post.blade.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[18,60,95,124,125,126],"class_list":["post-4267","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-article","tag-cyber-security","tag-cyber-crime","tag-cyber","tag-quishing","tag-phishing","tag-qr-codes"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.1 (Yoast SEO v26.7) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Understanding Quishing: QR Code Phishing Attacks - Acora ONE<\/title>\n<meta name=\"description\" content=\"Learn what quishing is and how to safeguard yourself from QR code phishing attacks.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Understanding Quishing: QR Code Phishing Attacks\" \/>\n<meta property=\"og:description\" content=\"Learn what quishing is and how to safeguard yourself from QR code phishing attacks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ki-acora.s.nomatter.dev\/one\/news\/article\/understanding-quishing-qr-code-phishing-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"Acora ONE\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/AcoraOne\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-04-09T08:07:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/static.acora.com\/app\/uploads\/sites\/2\/2025\/04\/Understanding-Quishing-Protect-Yourself-from-QR-Code-Phishing-Attacks.png\" \/>\n\t<meta property=\"og:image:width\" content=\"790\" \/>\n\t<meta property=\"og:image:height\" content=\"444\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"The Acora Press Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@acora_one\" \/>\n<meta name=\"twitter:site\" content=\"@acora_one\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"The Acora Press Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\/\/ki-acora.s.nomatter.dev\/one\/news\/article\/understanding-quishing-qr-code-phishing-attacks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/ki-acora.s.nomatter.dev\/one\/news\/article\/understanding-quishing-qr-code-phishing-attacks\/\"},\"author\":{\"name\":\"The Acora Press Team\",\"@id\":\"https:\/\/ki-acora.s.nomatter.dev\/one\/#\/schema\/person\/de47eff0dcc5e360b73649882262731e\"},\"headline\":\"Understanding Quishing: QR Code Phishing Attacks\",\"datePublished\":\"2025-04-09T08:07:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/ki-acora.s.nomatter.dev\/one\/news\/article\/understanding-quishing-qr-code-phishing-attacks\/\"},\"wordCount\":1107,\"image\":{\"@id\":\"https:\/\/ki-acora.s.nomatter.dev\/one\/news\/article\/understanding-quishing-qr-code-phishing-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/static.acora.com\/app\/uploads\/sites\/2\/2025\/04\/Understanding-Quishing-Protect-Yourself-from-QR-Code-Phishing-Attacks.png\",\"keywords\":[\"cyber security\",\"cyber crime\",\"cyber\",\"quishing\",\"phishing\",\"QR codes\"],\"articleSection\":[\"Article\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ki-acora.s.nomatter.dev\/one\/news\/article\/understanding-quishing-qr-code-phishing-attacks\/\",\"url\":\"https:\/\/ki-acora.s.nomatter.dev\/one\/news\/article\/understanding-quishing-qr-code-phishing-attacks\/\",\"name\":\"Understanding Quishing: QR Code Phishing Attacks - Acora ONE\",\"isPartOf\":{\"@id\":\"https:\/\/ki-acora.s.nomatter.dev\/one\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ki-acora.s.nomatter.dev\/one\/news\/article\/understanding-quishing-qr-code-phishing-attacks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ki-acora.s.nomatter.dev\/one\/news\/article\/understanding-quishing-qr-code-phishing-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/static.acora.com\/app\/uploads\/sites\/2\/2025\/04\/Understanding-Quishing-Protect-Yourself-from-QR-Code-Phishing-Attacks.png\",\"datePublished\":\"2025-04-09T08:07:43+00:00\",\"author\":{\"@id\":\"https:\/\/ki-acora.s.nomatter.dev\/one\/#\/schema\/person\/de47eff0dcc5e360b73649882262731e\"},\"description\":\"Learn what quishing is and how to safeguard yourself from QR code phishing attacks.\",\"breadcrumb\":{\"@id\":\"https:\/\/ki-acora.s.nomatter.dev\/one\/news\/article\/understanding-quishing-qr-code-phishing-attacks\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ki-acora.s.nomatter.dev\/one\/news\/article\/understanding-quishing-qr-code-phishing-attacks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/ki-acora.s.nomatter.dev\/one\/news\/article\/understanding-quishing-qr-code-phishing-attacks\/#primaryimage\",\"url\":\"https:\/\/static.acora.com\/app\/uploads\/sites\/2\/2025\/04\/Understanding-Quishing-Protect-Yourself-from-QR-Code-Phishing-Attacks.png\",\"contentUrl\":\"https:\/\/static.acora.com\/app\/uploads\/sites\/2\/2025\/04\/Understanding-Quishing-Protect-Yourself-from-QR-Code-Phishing-Attacks.png\",\"width\":790,\"height\":444,\"caption\":\"Understanding Quishing Protect Yourself from QR Code Phishing Attacks title picture\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ki-acora.s.nomatter.dev\/one\/news\/article\/understanding-quishing-qr-code-phishing-attacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/ki-acora.s.nomatter.dev\/one\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Understanding Quishing: QR Code Phishing Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ki-acora.s.nomatter.dev\/one\/#website\",\"url\":\"https:\/\/ki-acora.s.nomatter.dev\/one\/\",\"name\":\"Acora ONE\",\"description\":\"We offer IT Support, Cloud Services, Telecoms, Cyber Security and Software Development throughout Norfolk, Suffolk and nationwide. Call us on 01603 431200.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ki-acora.s.nomatter.dev\/one\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/ki-acora.s.nomatter.dev\/one\/#\/schema\/person\/de47eff0dcc5e360b73649882262731e\",\"name\":\"The Acora Press Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/ki-acora.s.nomatter.dev\/one\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f49ea7f3b1a87fbd47967cc4ca7d8fb465a57c950c1f45269f891b4066daec14?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f49ea7f3b1a87fbd47967cc4ca7d8fb465a57c950c1f45269f891b4066daec14?s=96&d=mm&r=g\",\"caption\":\"The Acora Press Team\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Understanding Quishing: QR Code Phishing Attacks - Acora ONE","description":"Learn what quishing is and how to safeguard yourself from QR code phishing attacks.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_GB","og_type":"article","og_title":"Understanding Quishing: QR Code Phishing Attacks","og_description":"Learn what quishing is and how to safeguard yourself from QR code phishing attacks.","og_url":"https:\/\/ki-acora.s.nomatter.dev\/one\/news\/article\/understanding-quishing-qr-code-phishing-attacks\/","og_site_name":"Acora ONE","article_publisher":"https:\/\/www.facebook.com\/AcoraOne\/","article_published_time":"2025-04-09T08:07:43+00:00","og_image":[{"width":790,"height":444,"url":"https:\/\/static.acora.com\/app\/uploads\/sites\/2\/2025\/04\/Understanding-Quishing-Protect-Yourself-from-QR-Code-Phishing-Attacks.png","type":"image\/png"}],"author":"The Acora Press Team","twitter_card":"summary_large_image","twitter_creator":"@acora_one","twitter_site":"@acora_one","twitter_misc":{"Written by":"The Acora Press Team","Estimated reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/ki-acora.s.nomatter.dev\/one\/news\/article\/understanding-quishing-qr-code-phishing-attacks\/#article","isPartOf":{"@id":"https:\/\/ki-acora.s.nomatter.dev\/one\/news\/article\/understanding-quishing-qr-code-phishing-attacks\/"},"author":{"name":"The Acora Press Team","@id":"https:\/\/ki-acora.s.nomatter.dev\/one\/#\/schema\/person\/de47eff0dcc5e360b73649882262731e"},"headline":"Understanding Quishing: QR Code Phishing Attacks","datePublished":"2025-04-09T08:07:43+00:00","mainEntityOfPage":{"@id":"https:\/\/ki-acora.s.nomatter.dev\/one\/news\/article\/understanding-quishing-qr-code-phishing-attacks\/"},"wordCount":1107,"image":{"@id":"https:\/\/ki-acora.s.nomatter.dev\/one\/news\/article\/understanding-quishing-qr-code-phishing-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/static.acora.com\/app\/uploads\/sites\/2\/2025\/04\/Understanding-Quishing-Protect-Yourself-from-QR-Code-Phishing-Attacks.png","keywords":["cyber security","cyber crime","cyber","quishing","phishing","QR codes"],"articleSection":["Article"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/ki-acora.s.nomatter.dev\/one\/news\/article\/understanding-quishing-qr-code-phishing-attacks\/","url":"https:\/\/ki-acora.s.nomatter.dev\/one\/news\/article\/understanding-quishing-qr-code-phishing-attacks\/","name":"Understanding Quishing: QR Code Phishing Attacks - Acora ONE","isPartOf":{"@id":"https:\/\/ki-acora.s.nomatter.dev\/one\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ki-acora.s.nomatter.dev\/one\/news\/article\/understanding-quishing-qr-code-phishing-attacks\/#primaryimage"},"image":{"@id":"https:\/\/ki-acora.s.nomatter.dev\/one\/news\/article\/understanding-quishing-qr-code-phishing-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/static.acora.com\/app\/uploads\/sites\/2\/2025\/04\/Understanding-Quishing-Protect-Yourself-from-QR-Code-Phishing-Attacks.png","datePublished":"2025-04-09T08:07:43+00:00","author":{"@id":"https:\/\/ki-acora.s.nomatter.dev\/one\/#\/schema\/person\/de47eff0dcc5e360b73649882262731e"},"description":"Learn what quishing is and how to safeguard yourself from QR code phishing attacks.","breadcrumb":{"@id":"https:\/\/ki-acora.s.nomatter.dev\/one\/news\/article\/understanding-quishing-qr-code-phishing-attacks\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ki-acora.s.nomatter.dev\/one\/news\/article\/understanding-quishing-qr-code-phishing-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/ki-acora.s.nomatter.dev\/one\/news\/article\/understanding-quishing-qr-code-phishing-attacks\/#primaryimage","url":"https:\/\/static.acora.com\/app\/uploads\/sites\/2\/2025\/04\/Understanding-Quishing-Protect-Yourself-from-QR-Code-Phishing-Attacks.png","contentUrl":"https:\/\/static.acora.com\/app\/uploads\/sites\/2\/2025\/04\/Understanding-Quishing-Protect-Yourself-from-QR-Code-Phishing-Attacks.png","width":790,"height":444,"caption":"Understanding Quishing Protect Yourself from QR Code Phishing Attacks title picture"},{"@type":"BreadcrumbList","@id":"https:\/\/ki-acora.s.nomatter.dev\/one\/news\/article\/understanding-quishing-qr-code-phishing-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ki-acora.s.nomatter.dev\/one\/"},{"@type":"ListItem","position":2,"name":"Understanding Quishing: QR Code Phishing Attacks"}]},{"@type":"WebSite","@id":"https:\/\/ki-acora.s.nomatter.dev\/one\/#website","url":"https:\/\/ki-acora.s.nomatter.dev\/one\/","name":"Acora ONE","description":"We offer IT Support, Cloud Services, Telecoms, Cyber Security and Software Development throughout Norfolk, Suffolk and nationwide. Call us on 01603 431200.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ki-acora.s.nomatter.dev\/one\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/ki-acora.s.nomatter.dev\/one\/#\/schema\/person\/de47eff0dcc5e360b73649882262731e","name":"The Acora Press Team","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/ki-acora.s.nomatter.dev\/one\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f49ea7f3b1a87fbd47967cc4ca7d8fb465a57c950c1f45269f891b4066daec14?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f49ea7f3b1a87fbd47967cc4ca7d8fb465a57c950c1f45269f891b4066daec14?s=96&d=mm&r=g","caption":"The Acora Press Team"}}]}},"_links":{"self":[{"href":"https:\/\/ki-acora.s.nomatter.dev\/one\/wp-json\/wp\/v2\/posts\/4267","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ki-acora.s.nomatter.dev\/one\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ki-acora.s.nomatter.dev\/one\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ki-acora.s.nomatter.dev\/one\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/ki-acora.s.nomatter.dev\/one\/wp-json\/wp\/v2\/comments?post=4267"}],"version-history":[{"count":4,"href":"https:\/\/ki-acora.s.nomatter.dev\/one\/wp-json\/wp\/v2\/posts\/4267\/revisions"}],"predecessor-version":[{"id":4273,"href":"https:\/\/ki-acora.s.nomatter.dev\/one\/wp-json\/wp\/v2\/posts\/4267\/revisions\/4273"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ki-acora.s.nomatter.dev\/one\/wp-json\/wp\/v2\/media\/4268"}],"wp:attachment":[{"href":"https:\/\/ki-acora.s.nomatter.dev\/one\/wp-json\/wp\/v2\/media?parent=4267"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ki-acora.s.nomatter.dev\/one\/wp-json\/wp\/v2\/categories?post=4267"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ki-acora.s.nomatter.dev\/one\/wp-json\/wp\/v2\/tags?post=4267"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}