Home SecurityMobile Security How attackers exploit QR codes and how to mitigate the risk