4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Is Combining Mobile Apps and ATMs a Good Idea?

Is Combining Mobile Apps and ATMs a Good Idea?

ATMs are, surprisingly enough, not the most secure pieces of technology out there, though there are efforts to improve security by taking advantage of mobile devices. Granted, this won’t be enough to protect against the considerable vulnerabilities in ATMs. In order to maximize security and minimize the amount of damage done by vulnerabilities, the user needs to understand how to protect themselves while using ATMs.

What’s Being Done?
Wells Fargo has created an initiative that lets members access their accounts through an ATM, even without their ATM cards, through a mobile device. The application in question allows the account holder to receive a temporary pass code that they can use at a Wells Fargo ATM alongside their PIN.

At the time of this writing, while Wells Fargo is certainly the one leading the pack in terms of app-based ATM access, there are others who are following suit. These organizations include Chase, Bank of America, and Citigroup, all of which have already started to implement similar measures for their ATMs.

However, that’s just the beginning. Wells Fargo’s ATMs also feature near-field communication (NFC), which lets their users access their funds without the need of their card. Users can also use their mobile device to scan their fingerprint, alongside entering their PIN. Only 40 percent of the ATMs are currently equipped with this feature, but it seems to be a great way to help card users in a pinch.

Will These Advancements Work?
These advancements might be a great way to help users stay more secure, but criminals will still find ways around these functions. This is apparent, as six times as many ATMs have been compromised since 2014.

Scammers are also taking advantage of cameras and card skimming technologies to steal information when a bank member accesses an ATM. Some of the more advanced card skimmers can be inserted directly into the ATM’s card scanning mechanism, giving thieves direct access to individual’s account information and security credentials. Even schemes like pinhole cameras can let hackers get a great view of a user’s PIN or card number.

To make matters worse, hackers might try to sabotage machines that don’t have their devices installed on them. This forces bank members to use the devices that have been tampered with, putting themselves at risk. Therefore, if you see a group of ATMs and only one of them works, you may want to avoid using it.

Even those who have chip-based cards aren’t safe from hackers, as scammers can use a method called “shimming” to steal the information located on the chip. While this is somewhat rare to encounter, chances are that hackers will eventually be able to streamline the process and it will become more popular over time--especially considering how common chip cards are now. That’s not even mentioning that the chip cards still have magnetic strips, which means that they might decide to just swipe the card.

A Couple of Problems
Keep in mind that ATMs are still rather vulnerable to scammers for a number of reasons. For one, these security features often are only added to the machine’s features rather than replacing old or ailing ones. For example, the Wells Fargo ATMs that allow for temporary PINs will still allow for access with less secure methods. Considering how there are only about 20 million Wells Fargo app users out of their 70 million members, there’s a majority that are still using less-secure features for their banking purposes.

Even further, this assumes that those 20 million app users will bother to take advantage of them in the first place. Sometimes a habit can be hard to break, especially when you’ve been using the same technology for so many years. Regrettably, some users will still just keep using their cards the same way, even though security is a valid reason to change it up.

What Can You Do?
Regardless of how you use ATMs, you’ll need to keep security at the top of your mind. To this end, it’s your responsibility to take advantage of whatever means necessary to protect your finances. The least you can do is shield your PIN with your other hand as you plug it into the ATM.

What are your thoughts on these ATM security practices? Let us know in the comments, and be sure to subscribe to our blog.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 11 December 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Privacy Best Practices Microsoft software Internet Business Computing Hackers Backup Productivity Hosted Solutions Business Management Managed Service Provider Google Malware IT Services Business Efficiency Windows IT Support Innovation Disaster Recovery Hardware Business Continuity Workplace Tips VoIP Saving Money Computer User Tips Upgrade Miscellaneous Virtualization Windows 10 Mobile Device Management Mobile Devices Data Server Network Security Mobile Computing Email Alert Save Money Microsoft Office Communication Network Small Business communications Quick Tips Smartphone Mobile Office Social Media Smartphones Information Technology BYOD Going Green Apps Android Health Office Browser Gadgets Application Ransomware Operating System Chrome Managed IT Services Outsourced IT Avoiding Downtime Managed IT Tablet WiFi Mobility Holiday Productivity Firewall Disaster Risk Management Remote Computing Cybersecurity Unified Threat Management IT Solutions Spam Best Practice Data Management BDR Cybercrime Search Passwords Telephone Systems The Internet of Things Facebook Hacking Hard Drives History Remote Monitoring Saving Time Apple Employer-Employee Relationship Budget Vendor Management VPN Automation Big Data Office Tips Data Recovery Law Enforcement iPhone Customer Relationship Management Content Filtering Proactive IT Phishing Password Data Backup User Error Hosted Solution Money Computers Collaboration Marketing Wireless Technology Recovery Phone System Humor Administration Printer Vulnerability Wearable Technology Work/Life Balance USB Antivirus Maintenance PowerPoint Encryption Analytics Office 365 Shortcut Virus Gmail Router Social Government Lithium-ion battery Telephony Bring Your Own Device Current Events Data Protection Computer Repair SaaS Tech Support Audit HaaS Outlook Business Intelligence Users Politics App Personal Information Windows 8 Cost Management Social Engineering Intranet Data Security Bandwidth Wireless Printer Server Unsupported Software Laptop Private Cloud Cloud Computing OneNote Google Drive Save Time Trending Education Point of Sale IT COnsultant Net Neutrality IT Support Identity Theft Display Solid State Drive Windows 10 Flexibility Sports Two-factor Authentication Managing Stress Augmented Reality Excel Paperless Office Samsung Wi-Fi Fax Server Artificial Intelligence Travel Social Networking Emergency Workplace Data Storage Applications Update Customer Service Streaming Media Biometrics hacker Uninterrupted Power Supply Retail online currency Virtual Reality Transportation Meetings Computer Care Battery Robot Instant Messaging Emails Automobile End of Support HIPAA Efficency Entertainment Network Congestion Benefits DDoS Computer Accessories Internet Exlporer Help Desk Mouse Compliance Internet of Things WIndows 7 Nokia eWaste Storage Inbound Marketing Patch Management OneDrive Employer Employee Relationship Amazon Regulations Google Maps Commerce Worker Commute Co-managed IT Operating Sysytem PDF Value Regulation Scalability Files Cameras Software as a Service Lifestyle User Ebay Text Messaging Science Sync Safety iOS Computing How To Chromecast Virtual Desktop Presentation Data Loss Bluetooth Best Available Managed IT Service Upgrades IT Technicians Adobe Managed IT Services Google Docs Computer Fan Training Hard Drive Administrator SharePoint Consultant Colocation The Blindside Of Licensing Microsoft Excel Uograde Dark Web Company Culture Images Black Market Access Teamwork Screen Mirroring Touchscreen IT Security Twitter Busines Continuity Near Field Communication File Sharing Cleaning Networking Surge Protector Cast Experience Windows 10s Keyboard Avoid Downtime Television IT consulting systems Nanotechnology 3D Printing Human Resources Running Cable Music Hard Disk Drive Hiring/Firing Wiring Tablets Reliable Computing hack Information Root Cause Analysis Data storage HBO ISP Books best practices Smart Technology Video Games Bloatware NFL Debate Cortana CrashOverride Document Management Advertising IT Management Programming Data Breach Blogging data breach Legal Word Legislation Settings Mobile Device Touchpad Branding Website Distributed Denial of Service WIndows Server 2008 Managed Security risk management Scam Windows Ink Comparison Taxes Specifications Supercomputer IT service Electronic Medical Records Conferencing IT Budget Domains Gifts Reputation Redundancy Webinar Youtube Tutorial Microblogging Buisness Credit Cards IT solutions Mobile Sales Shadow IT Relocation FAQ Managed Service Provder Professional Services Webinar Gift Giving