Velocity Technology Partners Blogs

Scammers and Skimmers Are a Bad Combination

Scammers and Skimmers Are a Bad Combination

Considering how often hackers target financial credentials like credit card numbers and expiration dates, it’s not surprising that ATMs can provide a wealth of information to them. Hackers are willing to go exceedingly far just to get their hands on these credentials--including physically altering the devices themselves to install skimmers and other technology on them. Unless you know what to look for, it can be difficult to tell if a machine has been tampered with.

For example, this news article from this past July shows a rather troublesome case of ATM skimming. The device used is a piece of plastic that slips right over the ATM card reader, and it’s designed to do so without being seen by the user. If you’re not paying attention, you could accidentally expose your credentials directly to the hacker.

There are a considerable amount of cases that involve a hacker installing custom hardware onto ATMs that can wirelessly transmit credentials, who might be lurking somewhere nearby. They can then harvest credentials at their leisure.

What would you do if you took a look at your bank account and found that you no longer have a balance in your checking account? What if you wound up going into debt because of this? What if someone has stolen your identity and is making purchases in foreign countries? The best way to keep this from happening is to be careful of ATM skimmers in the first place. Keep the following tips in mind when using an ATM.

  • Cameras surrounding the ATM: Before you stick your card in the ATM, make sure that there are several cameras pointing directly at the machine. This usually means that a hacker likely won’t try to mess with the device. ATMs usually have built-in cameras anyway, but it can never hurt to take another look around.
  • Tampering with the device: Give the device a once-over before you try to use it. Are any faceplates removed, or devices sticking out of it? If there is anything that doesn’t look natural, chances are that it’s been tampered with by a hacker.
  • Additional testing: Before you place your card in the device, take a look at the insert slot. Has it been placed on artificially? Just look for anything that’s out of place. Remember, it’s better to be safe than sorry.

What do you think about ATM skimmers? Do you think you can identify threats to your financial credentials? To learn more, reach out to us at (800) - 983 - 5765.

Business Continuity Allows You to Keep Your Busine...
Managed IT Services Can Help Your Organization Gro...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, October 23 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Data Backup PowerPoint IT Management Lifestyle File Sharing Conferencing Remote Monitoring Patch Management Employer-Employee Relationship Company Culture IT support Cast Network Communication Streaming Media Commerce Internet Remote Computing Mobile Device Management Update Malware Hosted Solution VPN Virtualization Devices Chromebook Wireless Charging Email Vulnerability Unsupported Software Software Social Media Ciminal Managed IT services Computer Forensics Cost Management VoIp Safety Antivirus Regulation IT Solutions Encryption Smartphone Data Theft Mobility Sales intranet Innovation Softphones Emergency Adobe Application Cloud Twitter Education Hard Drive Data Breach Mobile Security Computing Efficiency Charger IT Services Cybercrime Windows 10 Management Security Evernote Network Security Shortcut Managed Service Provider Cleaning Updates Hosted Solutions Apple Data Recovery Privacy Managed IT Services Best Practice Networking eWaste Sync Sports Google Assistant Redundancy Retail Tech Support Legal Google Maps Gifts Outsourced IT Financial Technology Data Loss Alert Screen Mirroring Word Chrome User Error Thank You Business Computing Artificial Intelligence Hackers Tech Term Bring Your Own Device Smartphones Saving Money Government Memory The Internet of Things Identity Financial Holiday OneNote Microsoft Word Gmail Work/Life Balance Blockchain Mobile Devices Smart Tech Cloud Computing Spam Data Protection Ransomware Best Practices Business Management Tablets Google Docs Storage Credit Cards Analysis Backup Android Wireless Technology Big Data HBO Two-factor Authentication Law Enforcement Licensing Tip of the Week Managing Stress Hardware Telephone FAQ Politics Specifications Content Filter Proactive Communications Disaster Recovery App store Gadgets Edge WiFi Software as a Service Business Continuity BDR Windows Ink Connectivity Collaboration Automation Microsoft Excel Business Data Unified Communications Project Management Computer Data Storage Legislation Marketing Workers Internet of Things Hybrid Cloud Compliance Flexibility Outlook iPhone Router Computers Device Security Proactive IT Risk Management Monitoring Operating System Comparison App Cortana Money Personal Information Printing Identity Theft Microsoft Office Content Filtering Cybersecurity Vendor Management Technology MSP Identities Phishing Gamification Browser Websites Maintenance Students WannaCry Audit IoT SaaS Small Business Value Excel Productivity Wireless Internet Data Security Language Fraud Apps Google Drive Spyware Google Passwords Social Engineering Microsoft BYOD Data Privacy Windows Travel IT budget Wi-Fi WIndows Server 2008 Office 365 Data Management Telephone Systems Applications Virus Managed IT NFL Server History User Tips Congratulations IT Support