4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Scammers and Skimmers Are a Bad Combination

Scammers and Skimmers Are a Bad Combination

Considering how often hackers target financial credentials like credit card numbers and expiration dates, it’s not surprising that ATMs can provide a wealth of information to them. Hackers are willing to go exceedingly far just to get their hands on these credentials--including physically altering the devices themselves to install skimmers and other technology on them. Unless you know what to look for, it can be difficult to tell if a machine has been tampered with.

For example, this news article from this past July shows a rather troublesome case of ATM skimming. The device used is a piece of plastic that slips right over the ATM card reader, and it’s designed to do so without being seen by the user. If you’re not paying attention, you could accidentally expose your credentials directly to the hacker.

There are a considerable amount of cases that involve a hacker installing custom hardware onto ATMs that can wirelessly transmit credentials, who might be lurking somewhere nearby. They can then harvest credentials at their leisure.

What would you do if you took a look at your bank account and found that you no longer have a balance in your checking account? What if you wound up going into debt because of this? What if someone has stolen your identity and is making purchases in foreign countries? The best way to keep this from happening is to be careful of ATM skimmers in the first place. Keep the following tips in mind when using an ATM.

  • Cameras surrounding the ATM: Before you stick your card in the ATM, make sure that there are several cameras pointing directly at the machine. This usually means that a hacker likely won’t try to mess with the device. ATMs usually have built-in cameras anyway, but it can never hurt to take another look around.
  • Tampering with the device: Give the device a once-over before you try to use it. Are any faceplates removed, or devices sticking out of it? If there is anything that doesn’t look natural, chances are that it’s been tampered with by a hacker.
  • Additional testing: Before you place your card in the device, take a look at the insert slot. Has it been placed on artificially? Just look for anything that’s out of place. Remember, it’s better to be safe than sorry.

What do you think about ATM skimmers? Do you think you can identify threats to your financial credentials? To learn more, reach out to us at 305-278-7100.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 22 January 2018
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Privacy Best Practices Microsoft software Internet Business Computing Hackers Backup Productivity Hosted Solutions Business Management Managed Service Provider Google Malware IT Services Business Efficiency Windows IT Support Innovation Disaster Recovery Business Continuity Hardware Workplace Tips VoIP Computer Mobile Devices User Tips Saving Money Miscellaneous Virtualization Upgrade Windows 10 Mobile Device Management Network Security Data Server Mobile Computing Email Alert communications Save Money Communication Microsoft Office Network Social Media Quick Tips Small Business Smartphone Smartphones BYOD Information Technology Going Green Mobile Office Managed IT Services Outsourced IT Health Android Office Apps Operating System Chrome Application Ransomware Browser Gadgets Productivity Managed IT Cybersecurity Holiday Disaster Firewall Mobility The Internet of Things Avoiding Downtime Tablet WiFi Spam Data Recovery BDR Best Practice Data Management Search Passwords Data Backup Cybercrime Telephone Systems Risk Management Remote Computing Unified Threat Management IT Solutions History Saving Time Hacking Apple Vendor Management Marketing VPN Employer-Employee Relationship Budget Facebook Remote Monitoring Automation Hard Drives Office Tips Proactive IT User Error Collaboration Phishing Law Enforcement Password Hosted Solution Wireless Technology Computers Big Data Recovery Phone System iPhone Customer Relationship Management Money Content Filtering Analytics Encryption Virus Vulnerability Router Gmail Government Antivirus Shortcut Lithium-ion battery Social Bring Your Own Device Work/Life Balance Office 365 Current Events Telephony Humor Administration Printer Wearable Technology USB Maintenance PowerPoint Cloud Computing Google Drive SaaS Users Audit App Windows 8 Save Time HaaS Cost Management Intranet Business Intelligence Data Protection Bandwidth Printer Server Laptop OneNote Social Engineering Data Security Point of Sale IT COnsultant Education Trending Net Neutrality Computer Repair Politics Private Cloud Personal Information Tech Support Wireless Unsupported Software Outlook Two-factor Authentication End of Support Workplace Managing Stress Excel Streaming Media Internet Exlporer Uninterrupted Power Supply online currency Internet of Things Travel Identity Theft Redundancy Data Storage Solid State Drive Flexibility Sports Customer Service Update Biometrics Retail Virtual Reality Network Congestion Efficency Samsung Meetings Wi-Fi Help Desk Artificial Intelligence Emergency Instant Messaging Emails Applications HIPAA Display Entertainment hacker Benefits Transportation DDoS Computer Accessories Augmented Reality Computer Care Paperless Office Compliance Battery Robot IT Support Mouse Social Networking Windows 10 Fax Server Automobile Regulation Regulations Books Video Games Software as a Service Smart Technology Value Uograde Document Management Images Sync Cameras Data Breach Advertising Legal Data Loss iOS User Mobile Device Touchpad Managed IT Service Science Adobe Virtual Desktop Managed IT Services Presentation Managed Security Twitter Google Docs Bluetooth Computer Fan Best Available Scam Surge Protector IT Technicians Licensing Television Wiring Microsoft Excel SharePoint Dark Web 3D Printing Employer Employee Relationship Information Worker Commute Operating Sysytem Screen Mirroring PDF Debate Scalability Files File Sharing Teamwork Cast ISP Busines Continuity Networking Windows 10s Near Field Communication Safety Text Messaging How To Chromecast systems Nanotechnology Programming Upgrades Blogging Tablets Human Resources Hard Disk Drive IT consulting Training Administrator hack Running Cable Root Cause Analysis HBO Consultant Website Nokia Colocation NFL best practices Reliable Computing The Blindside Of Company Culture Black Market Access Cortana CrashOverride IT Management OneDrive Bloatware Touchscreen Word data breach Amazon IT Security Cleaning Co-managed IT Legislation Settings WIndows Server 2008 Experience Avoid Downtime Windows Ink Branding risk management Keyboard Lifestyle Distributed Denial of Service Patch Management Ebay Music Google Maps Computing WIndows 7 Hiring/Firing Inbound Marketing Hard Drive Data storage eWaste Commerce Storage Updates Microblogging Youtube IT service Conferencing Tutorial Microsoft Word Sales Domains Gifts Managed Service Provder Device Security Webinar Taxes Webinar Devices Supercomputer Credit Cards Spyware Mobile Buisness IT solutions Electronic Medical Records IT Budget Gift Giving FAQ Professional Services Reputation Charger Wireless Charging WannaCry Shadow IT Relocation Evernote Comparison Workers Specifications