{"id":987501389,"date":"2025-09-02T15:39:15","date_gmt":"2025-09-02T19:39:15","guid":{"rendered":"https:\/\/www.aimglobal.org\/?post_type=tribe_events&#038;p=987501389"},"modified":"2025-09-02T15:43:34","modified_gmt":"2025-09-02T19:43:34","slug":"securing-digital-identities-the-growing-risk-of-qr-code-exploits-and-how-to-address-them","status":"publish","type":"tribe_events","link":"https:\/\/www.aimglobal.org\/event\/securing-digital-identities-the-growing-risk-of-qr-code-exploits-and-how-to-address-them\/","title":{"rendered":"Securing Digital Identities: The Growing Risk of QR-Code Exploits and How to Address Them"},"content":{"rendered":"<p data-start=\"381\" data-end=\"706\">As QR codes become a critical touchpoint across supply chains, retail, digital payments, and consumer engagement, they are increasingly targeted by cybercriminals. Emerging threats like <strong data-start=\"567\" data-end=\"593\">QR phishing (quishing)<\/strong> and <strong data-start=\"598\" data-end=\"612\">QR-jacking<\/strong> are exposing vulnerabilities that can compromise enterprise systems and erode consumer trust.<\/p>\n<p data-start=\"708\" data-end=\"1035\">This session provides a deep dive into the <strong data-start=\"751\" data-end=\"786\">latest QR code security threats<\/strong>, including those uncovered by leading global threat intelligence organizations. We&#8217;ll explore the <strong data-start=\"885\" data-end=\"930\">mechanics of modern QR code-based attacks<\/strong>, how threat actors are exploiting them across industries, and what businesses must do to stay protected.<\/p>\n<p data-start=\"1037\" data-end=\"1069\"><strong data-start=\"1037\" data-end=\"1069\">Key Takeaways for Attendees:<\/strong><\/p>\n<ul>\n<li data-start=\"1073\" data-end=\"1148\">An overview of <strong data-start=\"1088\" data-end=\"1121\">modern QR code attack vectors<\/strong> and exploitation tactics<\/li>\n<li data-start=\"1151\" data-end=\"1246\"><strong data-start=\"1151\" data-end=\"1178\">Real-world case studies<\/strong> of QR code misuse in supply chain, retail, and consumer scenarios<\/li>\n<li data-start=\"1249\" data-end=\"1371\">Insights into the role of <strong data-start=\"1275\" data-end=\"1309\">international standards bodies<\/strong> like GS1, AIM, and ISO in defining secure QR code practices<\/li>\n<li data-start=\"1374\" data-end=\"1530\">A comparative analysis of security solutions, including <strong data-start=\"1430\" data-end=\"1450\">GS1 Digital Link<\/strong>, <strong data-start=\"1452\" data-end=\"1477\">secure digital tokens<\/strong>, and <strong data-start=\"1483\" data-end=\"1528\">non-cloneable authentication technologies<\/strong><\/li>\n<li data-start=\"1533\" data-end=\"1639\">Strategic guidance on <strong data-start=\"1555\" data-end=\"1579\">mitigation practices<\/strong>, from consumer education to technological countermeasures<\/li>\n<\/ul>\n<p data-start=\"1641\" data-end=\"1888\">This session is essential for professionals in <strong data-start=\"1688\" data-end=\"1773\">cybersecurity, supply chain management, digital marketing, retail IT, and fintech<\/strong>, seeking to safeguard their QR code ecosystems and maintain consumer trust in the face of growing digital threats.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As QR codes become a critical touchpoint across supply chains, retail, digital payments, and consumer engagement, they are increasingly targeted by cybercriminals. Emerging threats like QR phishing (quishing) and QR-jacking [&hellip;]<\/p>\n","protected":false},"author":9,"featured_media":987501390,"template":"","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_price":"","_stock":"","_tribe_ticket_header":"","_tribe_default_ticket_provider":"","_ticket_start_date":"","_ticket_end_date":"","_tribe_ticket_show_description":"","_tribe_ticket_show_not_going":false,"_tribe_ticket_use_global_stock":"","_tribe_ticket_global_stock_level":"","_global_stock_mode":"","_global_stock_cap":"","_tribe_rsvp_for_event":"","_tribe_ticket_going_count":"","_tribe_ticket_not_going_count":"","_tribe_tickets_list":"[]","_tribe_ticket_has_attendee_info_fields":false,"_tribe_events_status":"","_tribe_events_status_reason":"","footnotes":"","_tec_slr_enabled":"","_tec_slr_layout":"","_links_to":"","_links_to_target":""},"tags":[],"tribe_events_cat":[],"class_list":["post-987501389","tribe_events","type-tribe_events","status-publish","has-post-thumbnail","hentry"],"aioseo_notices":[],"ticketed":false,"_links":{"self":[{"href":"https:\/\/www.aimglobal.org\/wp-json\/wp\/v2\/tribe_events\/987501389","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.aimglobal.org\/wp-json\/wp\/v2\/tribe_events"}],"about":[{"href":"https:\/\/www.aimglobal.org\/wp-json\/wp\/v2\/types\/tribe_events"}],"author":[{"embeddable":true,"href":"https:\/\/www.aimglobal.org\/wp-json\/wp\/v2\/users\/9"}],"version-history":[{"count":2,"href":"https:\/\/www.aimglobal.org\/wp-json\/wp\/v2\/tribe_events\/987501389\/revisions"}],"predecessor-version":[{"id":987501392,"href":"https:\/\/www.aimglobal.org\/wp-json\/wp\/v2\/tribe_events\/987501389\/revisions\/987501392"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aimglobal.org\/wp-json\/wp\/v2\/media\/987501390"}],"wp:attachment":[{"href":"https:\/\/www.aimglobal.org\/wp-json\/wp\/v2\/media?parent=987501389"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aimglobal.org\/wp-json\/wp\/v2\/tags?post=987501389"},{"taxonomy":"tribe_events_cat","embeddable":true,"href":"https:\/\/www.aimglobal.org\/wp-json\/wp\/v2\/tribe_events_cat?post=987501389"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}