MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Scammers and Skimmers Are a Bad Combination

Scammers and Skimmers Are a Bad Combination

Considering how often hackers target financial credentials like credit card numbers and expiration dates, it’s not surprising that ATMs can provide a wealth of information to them. Hackers are willing to go exceedingly far just to get their hands on these credentials--including physically altering the devices themselves to install skimmers and other technology on them. Unless you know what to look for, it can be difficult to tell if a machine has been tampered with.

For example, this news article from this past July shows a rather troublesome case of ATM skimming. The device used is a piece of plastic that slips right over the ATM card reader, and it’s designed to do so without being seen by the user. If you’re not paying attention, you could accidentally expose your credentials directly to the hacker.

There are a considerable amount of cases that involve a hacker installing custom hardware onto ATMs that can wirelessly transmit credentials, who might be lurking somewhere nearby. They can then harvest credentials at their leisure.

What would you do if you took a look at your bank account and found that you no longer have a balance in your checking account? What if you wound up going into debt because of this? What if someone has stolen your identity and is making purchases in foreign countries? The best way to keep this from happening is to be careful of ATM skimmers in the first place. Keep the following tips in mind when using an ATM.

  • Cameras surrounding the ATM: Before you stick your card in the ATM, make sure that there are several cameras pointing directly at the machine. This usually means that a hacker likely won’t try to mess with the device. ATMs usually have built-in cameras anyway, but it can never hurt to take another look around.
  • Tampering with the device: Give the device a once-over before you try to use it. Are any faceplates removed, or devices sticking out of it? If there is anything that doesn’t look natural, chances are that it’s been tampered with by a hacker.
  • Additional testing: Before you place your card in the device, take a look at the insert slot. Has it been placed on artificially? Just look for anything that’s out of place. Remember, it’s better to be safe than sorry.

What do you think about ATM skimmers? Do you think you can identify threats to your financial credentials? To learn more, reach out to us at (757) 420-5150.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, June 22 2018

Captcha Image

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Privacy Business Computing Network Security Hackers Malware Software Productivity Internet Hosted Solutions Backup Business Management google Computer Managed IT Services Microsoft Outsourced IT Disaster Recovery Mobile Devices Business Continuity Business communications VoIP IT Support Windows 10 Innovation Email User Tips Cybersecurity Hardware IT Services Data Backup Efficiency Cybercrime Ransomware Small Business Apps Windows Tech Term Saving Money Managed IT Mobile Device Management Data Recovery Server Mobility Law Enforcement Internet of Things Productivity Smartphone Operating System Data browser BDR Telephone Systems Office 365 Save Money Android Virtualization Money Phishing Smartphones Data Security Hosted Solution Cloud Computing Quick Tips Passwords Managed Service Provider Password Holiday Information Technology Chrome Recovery Communication Microsoft Office VPN BYOD Automation Miscellaneous Update Gadgets Computers Vulnerability Social Media Best Practice Two-factor Authentication Wireless Data Breach upgrade Social Budget Data Management Risk Management Unsupported Software App Network Collaboration IT Support Work/Life Balance Facebook Government Cost Management Google Drive Hacking Avoiding Downtime Wi-Fi Alert Application Health Current Events Audit Private Cloud Workplace Tips Office tips Applications History Spam Compliance Personal Information Remote Computing Proactive IT Managed IT Services Politics Social Engineering The Internet of Things Streaming Media Cleaning USB Save Time Employer-Employee Relationship search Identity Theft Tech Support Artificial Intelligence Flexibility Data Protection Shortcut Wireless Technology User Error Telephony Gmail Firewall Antivirus Content Filtering Patch Management Windows 10 Battery HaaS Robot IT solutions DDoS End of Support Wireless Charging Excel Automobile Data Storage Value Management Television Blockchain OneNote Saving Time Apple Disaster Humor Office Mobile Security Computer Care Phone System Devices WiFi Data Loss Going Green Legal Google Assistant Marketing Bandwidth Users Sports Encryption Google Docs eWaste Fraud Hacker Solid State Drive Big Data Internet Exlporer Redundancy Education iPhone Commerce Vendor Management Router Project Management SaaS Mobile Computing Cortana Samsung Transportation MSP FAQ Text Messaging Unified Threat Management Memory Augmented Reality Data Theft calculator NFL Lifestyle Business Intelligence Training Content Filter Touchscreen Entertainment Twitter Electronic Medical Records intranet control Charger Outlook Upgrades Students Computing Point of Sale Word Legislation Managed IT Service Company Culture Monitoring HIPAA WSJ Safety Uninterrupted Power Supply IT budget Black Market Exchange Consultant Laptop Unified Communications iOS Windows Ink Smart Technology Analysis Distributed Denial of Service altivista Avoid Downtime Comparison Maintenance Computer Fan Shadow IT SBS Evernote Regulation Touchpad Financial Google Maps Reputation App store Document Management compaq Specifications Advertising Screen Mirroring Financial Technology Experience Device Security Dark Web Identities Wearable Technology Networking Sync Software as a Service Meetings hp Video Games Sales Cast Data storage Printing Emails IoT Virtual Reality domain Workers Adobe Administration Settings Scam Chromecast Identity Retail Music Spyware WannaCry Language remote Updates Licensing Colocation Employer Employee Relationship Data Privacy Yahoo Conferencing Hard Drives HBO Computer Forensics Webinar Analytics Keyboard Files Running Cable Instant Messaging Server 2008 Microsoft Word Mobile Microsoft Excel Remote Monitoring Computer Accessories Administrator Hard Drive Worker Commute Lithium-ion battery Ali Rowghani Gifts Mobile Device PowerPoint Trending IT solutions Edge Virus Managing Stress Professional Services File Sharing Relocation Access Chromebook Ciminal Scalability IT Management Wireless Internet Windows 10s Books Nanotechnology Hiring/Firing Proactive server installation dvd "cannot install required files" Travel Storage Smart Tech stock How To Credit Cards PDF WIndows Server 2008 Gamification Hard Disk Drive Root Cause Analysis Benefits Websites Tablets Connectivity tweet CrashOverride Emergency Worker Cache Monitors Thank You Congratulations

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...