<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Quishing on it-learn.io | IT, Networking &amp; Cybersecurity Blog</title><link>https://blog.it-learn.io/tags/quishing/</link><description>Recent content in Quishing on it-learn.io | IT, Networking &amp; Cybersecurity Blog</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Tue, 05 May 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://blog.it-learn.io/tags/quishing/index.xml" rel="self" type="application/rss+xml"/><item><title>QR Code Phishing (Quishing): That Parking Meter QR Code Is Malicious</title><link>https://blog.it-learn.io/posts/2026-05-05-qr-code-phishing-quishing-malicious-qr-codes/</link><pubDate>Tue, 05 May 2026 00:00:00 +0000</pubDate><guid>https://blog.it-learn.io/posts/2026-05-05-qr-code-phishing-quishing-malicious-qr-codes/</guid><description>&lt;p&gt;Parking meters in major US cities started growing tumors in 2022 — small stickers placed over legitimate QR codes, redirecting drivers from official city payment systems to credential-harvesting sites. The FBI issued a formal warning. Cities pulled and replaced signage. The stickers cost a few cents to print.&lt;/p&gt;
&lt;p&gt;QR code phishing — commonly called quishing — exploits the same gap that has always made social engineering effective: the gap between what something appears to be and what it actually is. A QR code on a parking meter, a conference badge, a restaurant table, or an email attachment carries no visible indication of its destination. And for much of the history of enterprise email security, it carried that destination invisibly past every security scanner.&lt;/p&gt;</description></item></channel></rss>