{"version":"1.0","provider_name":"HX Spotlight Files","provider_url":"https:\/\/hexagoncenter.org\/spotlight","author_name":"Editorial","author_url":"https:\/\/hexagoncenter.org\/spotlight\/author\/ldsdaniel\/","title":"More Cyber Attackers Using QR Codes - HX Spotlight Files","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"DHV6T9Z4St\"><a href=\"https:\/\/hexagoncenter.org\/spotlight\/more-cyber-attackers-using-qr-codes\/\">More Cyber Attackers Using QR Codes<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/hexagoncenter.org\/spotlight\/more-cyber-attackers-using-qr-codes\/embed\/#?secret=DHV6T9Z4St\" width=\"600\" height=\"338\" title=\"&#8220;More Cyber Attackers Using QR Codes&#8221; &#8212; HX Spotlight Files\" data-secret=\"DHV6T9Z4St\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/hexagoncenter.org\/spotlight\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/hexagoncenter.org\/spotlight\/wp-content\/uploads\/2023\/03\/pexels-photo-278430.jpeg","thumbnail_width":1880,"thumbnail_height":1003,"description":"Cyber attackers are using QR code phishing campaigns in various ways to deceive users into giving away their personal information or downloading malware onto their devices. Hackers are diversifying attack methods, including a surge in QR code phishing campaigns, according to HP. That actors are experimenting with QR codes, Help Net Security One common method [&hellip;]"}