MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Is Combining Mobile Apps and ATMs a Good Idea?

Is Combining Mobile Apps and ATMs a Good Idea?

ATMs are, surprisingly enough, not the most secure pieces of technology out there, though there are efforts to improve security by taking advantage of mobile devices. Granted, this won’t be enough to protect against the considerable vulnerabilities in ATMs. In order to maximize security and minimize the amount of damage done by vulnerabilities, the user needs to understand how to protect themselves while using ATMs.

What’s Being Done?
Wells Fargo has created an initiative that lets members access their accounts through an ATM, even without their ATM cards, through a mobile device. The application in question allows the account holder to receive a temporary pass code that they can use at a Wells Fargo ATM alongside their PIN.

At the time of this writing, while Wells Fargo is certainly the one leading the pack in terms of app-based ATM access, there are others who are following suit. These organizations include Chase, Bank of America, and Citigroup, all of which have already started to implement similar measures for their ATMs.

However, that’s just the beginning. Wells Fargo’s ATMs also feature near-field communication (NFC), which lets their users access their funds without the need of their card. Users can also use their mobile device to scan their fingerprint, alongside entering their PIN. Only 40 percent of the ATMs are currently equipped with this feature, but it seems to be a great way to help card users in a pinch.

Will These Advancements Work?
These advancements might be a great way to help users stay more secure, but criminals will still find ways around these functions. This is apparent, as six times as many ATMs have been compromised since 2014.

Scammers are also taking advantage of cameras and card skimming technologies to steal information when a bank member accesses an ATM. Some of the more advanced card skimmers can be inserted directly into the ATM’s card scanning mechanism, giving thieves direct access to individual’s account information and security credentials. Even schemes like pinhole cameras can let hackers get a great view of a user’s PIN or card number.

To make matters worse, hackers might try to sabotage machines that don’t have their devices installed on them. This forces bank members to use the devices that have been tampered with, putting themselves at risk. Therefore, if you see a group of ATMs and only one of them works, you may want to avoid using it.

Even those who have chip-based cards aren’t safe from hackers, as scammers can use a method called “shimming” to steal the information located on the chip. While this is somewhat rare to encounter, chances are that hackers will eventually be able to streamline the process and it will become more popular over time--especially considering how common chip cards are now. That’s not even mentioning that the chip cards still have magnetic strips, which means that they might decide to just swipe the card.

A Couple of Problems
Keep in mind that ATMs are still rather vulnerable to scammers for a number of reasons. For one, these security features often are only added to the machine’s features rather than replacing old or ailing ones. For example, the Wells Fargo ATMs that allow for temporary PINs will still allow for access with less secure methods. Considering how there are only about 20 million Wells Fargo app users out of their 70 million members, there’s a majority that are still using less-secure features for their banking purposes.

Even further, this assumes that those 20 million app users will bother to take advantage of them in the first place. Sometimes a habit can be hard to break, especially when you’ve been using the same technology for so many years. Regrettably, some users will still just keep using their cards the same way, even though security is a valid reason to change it up.

What Can You Do?
Regardless of how you use ATMs, you’ll need to keep security at the top of your mind. To this end, it’s your responsibility to take advantage of whatever means necessary to protect your finances. The least you can do is shield your PIN with your other hand as you plug it into the ATM.

What are your thoughts on these ATM security practices? Let us know in the comments, and be sure to subscribe to our blog.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, 21 May 2018

Captcha Image

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Privacy Business Computing Network Security Hackers Malware Software Internet Hosted Solutions Backup google Productivity Business Management Managed IT Services Mobile Devices VoIP Computer Microsoft Disaster Recovery communications Business Continuity Outsourced IT Business IT Support Windows 10 Email User Tips Cybersecurity Hardware Innovation Productivity IT Services Efficiency Data Backup Cybercrime Server Ransomware Small Business Apps Windows Managed IT Mobility Saving Money Mobile Device Management browser Data Recovery Law Enforcement Internet of Things Smartphone Operating System Data Telephone Systems Save Money Tech Term Android Virtualization BDR Passwords Money Phishing Cloud Computing Smartphones Hosted Solution Quick Tips Data Security Password Information Technology Holiday Recovery Chrome Communication Microsoft Office BYOD Automation VPN Office 365 Alert Government Collaboration IT Support Health Miscellaneous Managed Service Provider Computers Two-factor Authentication Update Wireless Gadgets Best Practice Social Media Vulnerability Risk Management Unsupported Software Budget Data Management upgrade Social Data Breach Network Work/Life Balance Cost Management App Wi-Fi Google Drive Hacking Avoiding Downtime Facebook Personal Information Politics Office tips Applications Private Cloud History Cleaning Windows 10 USB Save Time Workplace Tips Proactive IT Spam The Internet of Things Identity Theft Social Engineering Managed IT Services Streaming Media Employer-Employee Relationship Flexibility Shortcut search Firewall Wireless Technology Application Antivirus Current Events Audit User Error Data Protection Telephony Compliance Mobile Computing Transportation Redundancy Automobile Gmail Blockchain Value Commerce Robot Saving Time Remote Computing Cortana Mobile Security End of Support IT solutions Patch Management Devices Office DDoS Computer Care Phone System Legal Wireless Charging Television Excel Fraud Humor Users Disaster Encryption Data Storage Apple Artificial Intelligence OneNote Big Data WiFi Sports Going Green Tech Support Project Management Bandwidth Data Loss Hacker Solid State Drive eWaste SaaS Marketing Internet Exlporer Google Docs Samsung Content Filtering Battery HaaS iPhone Point of Sale Professional Services IT budget Company Culture server installation dvd "cannot install required files" HIPAA File Sharing Analysis Management Text Messaging Consultant IT Management Maintenance stock Safety Windows 10s Black Market Travel Smart Technology Nanotechnology Avoid Downtime Storage App store Credit Cards Financial Technology WIndows Server 2008 Device Security tweet Hard Disk Drive Shadow IT Document Management Tablets Identities Root Cause Analysis calculator Experience FAQ Printing Laptop Twitter Uninterrupted Power Supply NFL IoT Augmented Reality control Business Intelligence Touchscreen Video Games Lifestyle Identity Charger Google Assistant Outlook Spyware Touchpad WSJ Virtual Reality Exchange Word Language Reputation Scam Distributed Denial of Service Managed IT Service altivista Music Legislation Data Privacy Advertising Computer Forensics iOS SBS Windows Ink Employer Employee Relationship Data storage compaq Analytics Comparison Hard Drive Evernote Regulation Edge Keyboard Computer Fan Instant Messaging Worker Commute Google Maps Virus Administration Wearable Technology Computer Accessories Chromecast Mobile Device Screen Mirroring hp Specifications Chromebook Networking Sync Ciminal Dark Web Managing Stress domain Software as a Service Proactive Colocation Meetings Hard Drives Cast Books Emails Scalability Sales Smart Tech Workers Adobe Hiring/Firing Files Education Administrator remote Lithium-ion battery Router Websites Vendor Management Settings Retail Connectivity Yahoo How To Updates Licensing MSP Benefits WannaCry Access Server 2008 Data Theft Relocation Running Cable Conferencing Content Filter Unified Threat Management HBO Ali Rowghani Webinar Microsoft Word Trending Mobile intranet Training Entertainment Microsoft Excel Computing Gifts Monitoring PDF Upgrades Electronic Medical Records IT solutions Thank You Emergency Congratulations Worker CrashOverride Cache Monitors Remote Monitoring

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...