Eleven facts users consider when adopting NFC over QR codes

Emerging trends in QR fraud

1. Cybersecurity - QR codes push data into your mobile where it is saved and stored in contacts. If the data is malicious, it could trigger an attack on the device, App store, SMS and email or more critically exploit the payment data stored on the device.

2. Social engineering - Scanning a QR code is like calling someone and handing over your caller ID information, exposing your phone and identification credentials such as social media profile, geo-location or calendar event.

3. Corporate fraud - usage of QR in public locations enables fraudsters to replace legitimate QR codes with malicious content which contains malware, an exploit or other undesirable content. For example, fraudsters in the Netherlands were asking individuals to pay their parking fee by scanning a QR code in exchange for cash, saying that the machine was broken and therefore not accepting cash. When the victim scanned the QR code, money from their account would be transferred out.

4. Dynamic QR codes are generated once, but the data stored on them can be edited at any later date enabling fraudsters to target malicious activity towards specific devices, increasing the potential damage.

In China, mobility as a service bike-sharing is popular and users pay in advance to unlock a bike, criminals replaced the QR codes on a large number of bikes with their own codes. Many potential bike renters simply shrug it off when the bike fails to unlock and move on to the next one.

How Spring NFC tags are more secure, tamper-resistant and better for payments

5. Narrowcast for intentional usage - with a 4cm read range, NFC is more secure than QR for users. Eavesdropping on NFC interactions has been highlighted but with the proximity read range of NFC, it's highly unlikely a fraudster can get that close to a Spring.

6. Data corruption - because data is managed and stored on our platform, fraudsters would have to break through the secure authentication process to manipulate data. the Spring's data is locked at point of interaction.

7. Speed of access - no need to open your camera - an NFC reader built into the mobile phone enables tap and go.

8. More tamper-resistant - Spring locks and secured the URL within the chip. This means it cannot be swapped out for a different location and enables monitoring.

9. Wear and tear - with NFC, chips are embedded into a Spring securely and can't be as easily damaged as QR codes.

10. Cybersecurity - because Spring is active-passive pairing with a mobile device,This means one device receives info and the other sends it instead of both devices receiving and passing information making it difficult for interceptive attacks.

11. Payment security - Because payments are managed through existing payment providers, the security protocols are governed by with a Custom Spring, you can select an NFC chip with higher security levels than a standard chip, meeting security and compliance protocols.

Company Registration Number: 12610627

Spring Limited, 24 Longmoor Road, Liphook, GU30 7NY, UK

Copyright © 2022 Oomph Go Limited. All rights reserved.