Velocity Technology Partners Blog

Velocity Technology Partners has been serving the Bogart area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Scammers and Skimmers Are a Bad Combination

Scammers and Skimmers Are a Bad Combination

Considering how often hackers target financial credentials like credit card numbers and expiration dates, it’s not surprising that ATMs can provide a wealth of information to them. Hackers are willing to go exceedingly far just to get their hands on these credentials--including physically altering the devices themselves to install skimmers and other technology on them. Unless you know what to look for, it can be difficult to tell if a machine has been tampered with.

For example, this news article from this past July shows a rather troublesome case of ATM skimming. The device used is a piece of plastic that slips right over the ATM card reader, and it’s designed to do so without being seen by the user. If you’re not paying attention, you could accidentally expose your credentials directly to the hacker.

There are a considerable amount of cases that involve a hacker installing custom hardware onto ATMs that can wirelessly transmit credentials, who might be lurking somewhere nearby. They can then harvest credentials at their leisure.

What would you do if you took a look at your bank account and found that you no longer have a balance in your checking account? What if you wound up going into debt because of this? What if someone has stolen your identity and is making purchases in foreign countries? The best way to keep this from happening is to be careful of ATM skimmers in the first place. Keep the following tips in mind when using an ATM.

  • Cameras surrounding the ATM: Before you stick your card in the ATM, make sure that there are several cameras pointing directly at the machine. This usually means that a hacker likely won’t try to mess with the device. ATMs usually have built-in cameras anyway, but it can never hurt to take another look around.
  • Tampering with the device: Give the device a once-over before you try to use it. Are any faceplates removed, or devices sticking out of it? If there is anything that doesn’t look natural, chances are that it’s been tampered with by a hacker.
  • Additional testing: Before you place your card in the device, take a look at the insert slot. Has it been placed on artificially? Just look for anything that’s out of place. Remember, it’s better to be safe than sorry.

What do you think about ATM skimmers? Do you think you can identify threats to your financial credentials? To learn more, reach out to us at (800) - 983 - 5765.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 18 January 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Data Breach Excel Thank You Microsoft Word Business Continuity Sports Google Docs Smartphone Passwords HBO WIndows Server 2008 Email IT support Disaster Recovery Productivity Comparison Saving Money Malware SaaS Phishing Law Enforcement IT Solutions Government iPhone Windows Privacy Wireless Charging Data Recovery Data Storage Money Wi-Fi Wireless Technology Google Drive Audit Sync FAQ Sales VoIp Managed IT Services Hackers Backup Internet Microsoft Excel Word Two-factor Authentication Mobile Device Management Apple Licensing Specifications eWaste VPN Gifts The Internet of Things Mobility File Sharing Mobile Devices Updates Hosted Solutions Cloud Computing Data Management Windows Ink Congratulations Marketing Virtualization Microsoft Computers Lifestyle User Tips Cast Legislation Redundancy Computer Work/Life Balance Adobe Encryption Office 365 IT Services WiFi Server Data Backup Outlook Spam Politics Apps Data Security WannaCry Smartphones Microsoft Office Telephone Systems Proactive IT Business Management Unsupported Software Windows 10 Software as a Service Conferencing Android Workers Retail Shortcut Browser Vulnerability Google Maps Travel Data Loss Screen Mirroring Commerce Outsourced IT Credit Cards Managed IT Small Business Storage Applications Gadgets Personal Information Holiday Best Practices Chrome OneNote Evernote Hosted Solution Cloud Risk Management Maintenance Tip of the Week Best Practice Managed Service Provider BYOD Alert Artificial Intelligence Data Protection IT Management Emergency Identity Theft Hardware Cybercrime Networking User Error Cortana Patch Management Technology Social Media Tablets NFL Charger Communications Network Security Collaboration Content Filtering Security IT Support App Cybersecurity History Google Software

Blog Archive

February
March
April
May
June
July
August
September
October
November
December