The paper analyzes the security vulnerabilities of mobile authentication systems using QR codes, highlighting risks such as cloning, hijacking, and eavesdropping. The authors examine various architectures of QR-code authentication and discuss countermeasures to enhance security, including blocking screen captures and expiring QR codes. Recommendations are also made for improving implementation to mitigate the inherent vulnerabilities of mobile applications.