Velocity Technology Partners Blog

Velocity Technology Partners has been serving Athens, Gainesville and North Georgia since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Scammers and Skimmers Are a Bad Combination

Scammers and Skimmers Are a Bad Combination

Considering how often hackers target financial credentials like credit card numbers and expiration dates, it’s not surprising that ATMs can provide a wealth of information to them. Hackers are willing to go exceedingly far just to get their hands on these credentials--including physically altering the devices themselves to install skimmers and other technology on them. Unless you know what to look for, it can be difficult to tell if a machine has been tampered with.

For example, this news article from this past July shows a rather troublesome case of ATM skimming. The device used is a piece of plastic that slips right over the ATM card reader, and it’s designed to do so without being seen by the user. If you’re not paying attention, you could accidentally expose your credentials directly to the hacker.

There are a considerable amount of cases that involve a hacker installing custom hardware onto ATMs that can wirelessly transmit credentials, who might be lurking somewhere nearby. They can then harvest credentials at their leisure.

What would you do if you took a look at your bank account and found that you no longer have a balance in your checking account? What if you wound up going into debt because of this? What if someone has stolen your identity and is making purchases in foreign countries? The best way to keep this from happening is to be careful of ATM skimmers in the first place. Keep the following tips in mind when using an ATM.

  • Cameras surrounding the ATM: Before you stick your card in the ATM, make sure that there are several cameras pointing directly at the machine. This usually means that a hacker likely won’t try to mess with the device. ATMs usually have built-in cameras anyway, but it can never hurt to take another look around.
  • Tampering with the device: Give the device a once-over before you try to use it. Are any faceplates removed, or devices sticking out of it? If there is anything that doesn’t look natural, chances are that it’s been tampered with by a hacker.
  • Additional testing: Before you place your card in the device, take a look at the insert slot. Has it been placed on artificially? Just look for anything that’s out of place. Remember, it’s better to be safe than sorry.

What do you think about ATM skimmers? Do you think you can identify threats to your financial credentials? To learn more, reach out to us at (800) - 983 - 5765.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, July 18 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Specifications Personal Information Windows 10 Computer Forensics Best Practice IT Services Two-factor Authentication Mobility Ransomware Software as a Service Hosted Solution Education Management Automation NFL Social Engineering Microsoft Office User Tips Data Protection Microsoft Excel Server Chrome Screen Mirroring Flexibility Smartphone IT Management VPN Outsourced IT Money Business Computing Google Drive BYOD Analysis Gifts Ciminal Antivirus Lifestyle File Sharing User Error Remote Monitoring Students Computers IoT Google Assistant Data Theft Connectivity Proactive IT Cast Chromebook Networking Managed IT Content Filter Travel Devices Business Continuity Edge Employer-Employee Relationship Redundancy Memory Sales Data Management Work/Life Balance Wireless Charging Office 365 Vulnerability Network Security Fraud Software Android Communication Cleaning Managing Stress Innovation Efficiency IT Support Update IT support Licensing BDR Hardware Passwords Application Apps Unsupported Software App store Excel Shortcut Telephone Tablets Social Media Business Management Spam Gamification Mobile Devices Small Business Malware Value Tech Support Operating System Legislation Congratulations Mobile Device Management Tech Term Company Culture Vendor Management Risk Management Artificial Intelligence Hard Drive intranet Smartphones Comparison Commerce Router VoIp Sports Managed IT Services Blockchain Managed IT services Security Data Backup Encryption Marketing Proactive Windows Maintenance IT budget Outlook FAQ Storage Government Adobe Credit Cards Business Safety Internet SaaS Hackers Remote Computing Backup Financial Technology Computing Holiday Google Docs MSP Retail Patch Management Google Microsoft Gmail Twitter Hosted Solutions Legal Cybersecurity Data Storage Streaming Media Virtualization Gadgets Internet of Things Conferencing Collaboration Evernote Politics Saving Money Wi-Fi Communications Cost Management Printing IT Solutions Managed Service Provider Word Windows Ink Charger Microsoft Word Data Recovery Workers WiFi Content Filtering Email Spyware Best Practices Privacy Virus WIndows Server 2008 WannaCry Compliance Device Security Monitoring App Disaster Recovery Wireless Technology Language Data Data Loss Softphones Updates Data Breach Data Security Identity Tip of the Week Hybrid Cloud Network Financial Technology Emergency The Internet of Things PowerPoint Identities Sync Productivity Browser Cloud Computing Mobile Security Audit Wireless Internet Unified Communications Cybercrime Thank You Bring Your Own Device Identity Theft Applications History Project Management Cortana Phishing eWaste Telephone Systems Alert Smart Tech Apple Law Enforcement iPhone Google Maps HBO Computer Cloud Websites Data Privacy Big Data OneNote