MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Scammers and Skimmers Are a Bad Combination

Scammers and Skimmers Are a Bad Combination

Considering how often hackers target financial credentials like credit card numbers and expiration dates, it’s not surprising that ATMs can provide a wealth of information to them. Hackers are willing to go exceedingly far just to get their hands on these credentials--including physically altering the devices themselves to install skimmers and other technology on them. Unless you know what to look for, it can be difficult to tell if a machine has been tampered with.

For example, this news article from this past July shows a rather troublesome case of ATM skimming. The device used is a piece of plastic that slips right over the ATM card reader, and it’s designed to do so without being seen by the user. If you’re not paying attention, you could accidentally expose your credentials directly to the hacker.

There are a considerable amount of cases that involve a hacker installing custom hardware onto ATMs that can wirelessly transmit credentials, who might be lurking somewhere nearby. They can then harvest credentials at their leisure.

What would you do if you took a look at your bank account and found that you no longer have a balance in your checking account? What if you wound up going into debt because of this? What if someone has stolen your identity and is making purchases in foreign countries? The best way to keep this from happening is to be careful of ATM skimmers in the first place. Keep the following tips in mind when using an ATM.

  • Cameras surrounding the ATM: Before you stick your card in the ATM, make sure that there are several cameras pointing directly at the machine. This usually means that a hacker likely won’t try to mess with the device. ATMs usually have built-in cameras anyway, but it can never hurt to take another look around.
  • Tampering with the device: Give the device a once-over before you try to use it. Are any faceplates removed, or devices sticking out of it? If there is anything that doesn’t look natural, chances are that it’s been tampered with by a hacker.
  • Additional testing: Before you place your card in the device, take a look at the insert slot. Has it been placed on artificially? Just look for anything that’s out of place. Remember, it’s better to be safe than sorry.

What do you think about ATM skimmers? Do you think you can identify threats to your financial credentials? To learn more, reach out to us at (757) 420-5150.

e-max.it: your social media marketing partner
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 23 February 2018

Captcha Image

Tag Cloud

Tip of the Week Security Technology Cloud Privacy Best Practices Business Computing Hackers Network Security Malware Software Internet Hosted Solutions Backup google Business Management Productivity Managed IT Services Computer Microsoft Disaster Recovery Business Continuity Business IT Support Mobile Devices Outsourced IT User Tips Windows 10 communications VoIP IT Services Email Productivity Hardware Innovation Cybercrime Efficiency Mobility Mobile Device Management Windows Managed IT Data Backup Server Ransomware Apps Smartphone Cybersecurity Small Business Save Money Data Recovery Saving Money browser Telephone Systems Law Enforcement Internet of Things Operating System Hosted Solution Quick Tips Android Virtualization Holiday BDR Money Office 365 Chrome Information Technology Recovery VPN Microsoft Office Passwords BYOD Data Data Security Password Alert Health Miscellaneous Managed Service Provider Computers IT Support upgrade Social Best Practice Social Media App Communication Budget Smartphones Data Management Wireless Phishing Facebook Government Risk Management Unsupported Software Cloud Computing Google Drive Hacking Avoiding Downtime Gadgets Work/Life Balance Wi-Fi Firewall Application Applications Private Cloud Office tips Social Engineering Current Events History Collaboration Audit Proactive IT Personal Information search The Internet of Things Windows 10 Politics Two-factor Authentication Vulnerability USB Save Time User Error Managed IT Services Data Breach Identity Theft Wireless Technology Flexibility Shortcut Automation Workplace Tips Telephony DDoS Mobile Computing Cost Management Project Management Google Docs Transportation SaaS Television Robot Data Protection Samsung Antivirus Content Filtering Battery End of Support Streaming Media Remote Computing Apple Redundancy HaaS Commerce Compliance WiFi Going Green Automobile Blockchain Cortana Bandwidth Humor Disaster eWaste Employer-Employee Relationship Saving Time Spam Cleaning Office Network Excel Sports Computer Care Phone System Data Storage Tech Support Legal Users Encryption Hacker OneNote Internet Exlporer Solid State Drive Gmail Artificial Intelligence Update iPhone IT solutions Data Loss Marketing Scalability Updates Licensing WannaCry Books Hiring/Firing Education WSJ Conferencing HBO Vendor Management Exchange Webinar Router Text Messaging How To Microsoft Word Distributed Denial of Service Mobile altivista Benefits MSP Microsoft Excel Gifts SBS IT solutions Professional Services Unified Threat Management compaq intranet File Sharing Laptop Wearable Technology IT Management Uninterrupted Power Supply Training Windows 10s Entertainment Travel Upgrades hp Nanotechnology Electronic Medical Records Point of Sale IT budget Storage Credit Cards Touchpad WIndows Server 2008 Company Culture domain Hard Disk Drive HIPAA Black Market Maintenance Reputation Tablets Consultant Root Cause Analysis Smart Technology Advertising FAQ Patch Management Value remote Avoid Downtime Shadow IT Device Security NFL Yahoo Augmented Reality Business Intelligence Touchscreen Document Management Identities Lifestyle Data storage Charger Running Cable Outlook Server 2008 Experience Devices Administration Word Chromecast Ali Rowghani Managed IT Service Trending Legislation Wireless Charging iOS Video Games Virtual Reality Spyware Colocation Windows Ink Scam Hard Drives Comparison Evernote Regulation Files server installation dvd "cannot install required files" Computer Fan Music Fraud Google Maps Administrator stock Lithium-ion battery Screen Mirroring Employer Employee Relationship Specifications Networking Sync Dark Web Analytics Keyboard Instant Messaging Edge Relocation Software as a Service Access tweet Meetings Cast Computer Accessories Emails Worker Commute Sales Workers Adobe Mobile Device calculator Big Data Managing Stress Ciminal Twitter Settings Retail control PDF Cache Monitors Remote Monitoring Safety Emergency Worker CrashOverride Thank You Congratulations

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...