
Here things are all very ordinary and spin at best, but with the increased use of this topic technical Valhakrz also can you create posters of the QR code containing links to malicious programs based Belsagaha in products found in any supermarket and you see a high demand it, the goal of this topic posters is a breakthrough smartphone and access to sensitive data, as we know with increasing the scope of the use of a smartphone (iPhone, Alandroed, Windows iPhone ...) uses the phone moved from the traditional use of answering calls and sending messages to surfing the Internet and through the purchase sites ... Etc., which makes the goal of a hacker to penetrate the smartphone is access to the data sensitive, only after the victim takes a picture of the QR code, where it may be Tugeah to the site of a malignant or injected directly into php to malignant cell phone, which would make him inevitably into the hands of a hacker, for this by the state must pick up a picture of the QR code to make sure that the label is a function of the product and any product Aotafr more than R Alkio On one ignored
Friday, April 13, 2012
// //
0
comments
//
0 comments to "Security risks Of the QR and how to avoid them"
Search This Blog
Followers
Visiteur Online
Blog Archive
-
▼
2012
(24)
-
▼
April
(24)
- Security risks Of the QR and how to avoid them
- Handsome William Levy .. From poor to destitute se...
- Freedom of expression and a means or an end? With ...
- Is the virtual world has become a reality ..?!
- The most important television media
- CEO Kaz Hirai of Sony reveals a new strategy and y...
- Samsung offer cloud computing solutions for busine...
- MEGAUPLOAD founder released on bail
- barack obama bill called privacy rights on the Int...
- acer reveal her smart Liquid Glow system Android 4.0
- HUAWEI phone reveals the world's fastest
- Canonical released the beta version of the operati...
- Cell Phone Nokia 808 PureView camera up to 41 mega...
- Gmail can identify the reporter whether the hacker...
- A new technique for the shipment of mobile phones ...
- FACEBOOK able to spy on our SMS text !!
- Google Erth contributes to the theft of Mines and ...
- Do not believe any news no doubt read on the Inter...
- Important rules to surf the security of Internet
- Send Free SMS to all over the world
- Turn off the computer and run it several times a d...
- Pornographic sites is the first taste most commonl...
- Do you must download programs from a trusted site ??
- Is there really such thing as a profit money from ...
-
▼
April
(24)
Total Pageviews
4276
Post a Comment