In this paper we outlined the dangers of possible attacks
utilizing manipulated QR Codes. Since QR Codes gain increasing
popularity through their use for marketing purposes,
we expect that this kind of attack will receive more
and more attention by the hacking community in the future.
Furthermore, many mobile devices (e.g., smartphones) at
present are able to decode QR Codes and access the URLs
contained in them. This adds a new dimension to the topic of
trust, especially since most users are not security-conscious
enough when using their mobile phones (which also enables
the use of novel phishing techniques). In addition to phishing,
a multitude of other attack methods, both against humans
and automated systems, might be performed using QR