4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Scammers and Skimmers Are a Bad Combination

Scammers and Skimmers Are a Bad Combination

Considering how often hackers target financial credentials like credit card numbers and expiration dates, it’s not surprising that ATMs can provide a wealth of information to them. Hackers are willing to go exceedingly far just to get their hands on these credentials--including physically altering the devices themselves to install skimmers and other technology on them. Unless you know what to look for, it can be difficult to tell if a machine has been tampered with.

For example, this news article from this past July shows a rather troublesome case of ATM skimming. The device used is a piece of plastic that slips right over the ATM card reader, and it’s designed to do so without being seen by the user. If you’re not paying attention, you could accidentally expose your credentials directly to the hacker.

There are a considerable amount of cases that involve a hacker installing custom hardware onto ATMs that can wirelessly transmit credentials, who might be lurking somewhere nearby. They can then harvest credentials at their leisure.

What would you do if you took a look at your bank account and found that you no longer have a balance in your checking account? What if you wound up going into debt because of this? What if someone has stolen your identity and is making purchases in foreign countries? The best way to keep this from happening is to be careful of ATM skimmers in the first place. Keep the following tips in mind when using an ATM.

  • Cameras surrounding the ATM: Before you stick your card in the ATM, make sure that there are several cameras pointing directly at the machine. This usually means that a hacker likely won’t try to mess with the device. ATMs usually have built-in cameras anyway, but it can never hurt to take another look around.
  • Tampering with the device: Give the device a once-over before you try to use it. Are any faceplates removed, or devices sticking out of it? If there is anything that doesn’t look natural, chances are that it’s been tampered with by a hacker.
  • Additional testing: Before you place your card in the device, take a look at the insert slot. Has it been placed on artificially? Just look for anything that’s out of place. Remember, it’s better to be safe than sorry.

What do you think about ATM skimmers? Do you think you can identify threats to your financial credentials? To learn more, reach out to us at 305-278-7100.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 19 November 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Privacy Best Practices Microsoft software Internet Business Computing Hackers Backup Productivity Hosted Solutions Business Management Managed Service Provider Malware Google IT Services Business Efficiency Windows Innovation Disaster Recovery IT Support Business Continuity Hardware Workplace Tips VoIP Computer User Tips Saving Money Miscellaneous Virtualization Upgrade Windows 10 Mobile Device Management Mobile Devices Data Server Network Security Mobile Computing Alert Email Communication Save Money Network Microsoft Office communications Quick Tips Smartphone Small Business Social Media Smartphones BYOD Going Green Information Technology Mobile Office Android Health Office Apps Application Ransomware Operating System Chrome Managed IT Services Browser Outsourced IT Gadgets Mobility Disaster Holiday Firewall Tablet Productivity Avoiding Downtime Managed IT WiFi IT Solutions Cybersecurity Spam Best Practice Data Management BDR Passwords Cybercrime Search Telephone Systems Risk Management The Internet of Things Remote Computing Unified Threat Management Hard Drives Hacking Saving Time Apple Vendor Management Employer-Employee Relationship Budget VPN Automation Facebook Remote Monitoring History Office Tips Law Enforcement Content Filtering Proactive IT Phishing User Error Password Marketing Hosted Solution Collaboration Computers Money Data Recovery Wireless Technology Recovery Phone System iPhone Customer Relationship Management Big Data Data Backup Virus USB Work/Life Balance Analytics Encryption Antivirus Gmail Router Office 365 Shortcut Government Social Bring Your Own Device Lithium-ion battery Telephony Vulnerability Humor Administration Current Events Wearable Technology Maintenance PowerPoint Printer SaaS Audit Users Outlook Data Security HaaS Windows 8 Business Intelligence App Politics Cost Management Personal Information Intranet Social Engineering Bandwidth Printer Server Point of Sale Laptop Wireless IT COnsultant Unsupported Software OneNote Private Cloud Computer Repair Google Drive Cloud Computing Education Trending Save Time Net Neutrality Data Protection Tech Support Paperless Office Excel Fax Server Samsung Wi-Fi Workplace Emergency Travel Artificial Intelligence Streaming Media Applications Update Customer Service Uninterrupted Power Supply online currency Biometrics Retail hacker Virtual Reality Transportation Meetings Network Congestion IT Support Battery Robot Windows 10 Computer Care Help Desk Instant Messaging Emails Automobile Efficency HIPAA End of Support Entertainment Benefits DDoS Computer Accessories Internet Exlporer Mouse Compliance Data Storage Internet of Things Display Identity Theft Solid State Drive Social Networking Sports Two-factor Authentication Augmented Reality Flexibility Managing Stress Cast Lifestyle Value PDF Scalability Files Ebay Windows 10s Cameras User Uograde systems Images Computing Nanotechnology Science Safety Text Messaging How To Chromecast Tablets Hard Disk Drive Virtual Desktop Presentation Upgrades Best Available hack Root Cause Analysis Bluetooth HBO IT Technicians Administrator NFL best practices Training Consultant Colocation Cortana CrashOverride SharePoint IT Management The Blindside Of Black Market Access Word Wiring data breach Twitter Company Culture Teamwork Touchscreen Information Legislation Settings WIndows Server 2008 Surge Protector IT Security Busines Continuity Near Field Communication Debate Windows Ink risk management Networking Television Cleaning Experience 3D Printing Patch Management Keyboard Avoid Downtime IT consulting Google Maps Human Resources Running Cable Music Commerce ISP Regulation Hiring/Firing Reliable Computing Data storage Software as a Service Books Nokia Programming Sync Blogging Bloatware Smart Technology Video Games Document Management Data Loss iOS Data Breach Advertising Managed IT Service Adobe Website Managed IT Services Legal Touchpad Google Docs Computer Fan Branding Mobile Device Distributed Denial of Service Managed Security OneDrive Licensing Scam WIndows 7 Microsoft Excel Amazon Dark Web eWaste Co-managed IT Storage Inbound Marketing Screen Mirroring Employer Employee Relationship Regulations Worker Commute Operating Sysytem File Sharing Hard Drive Electronic Medical Records Microblogging Professional Services Youtube IT Budget Domains Sales Reputation Managed Service Provder Webinar Tutorial Buisness Shadow IT Relocation Comparison Specifications Gift Giving Webinar Taxes Mobile IT solutions Supercomputer IT service