Eclipse Integrated Systems Blog

Eclipse Integrated Systems has been serving the Bridgewater area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Scammers and Skimmers Are a Bad Combination

Considering how often hackers target financial credentials like credit card numbers and expiration dates, it’s not surprising that ATMs can provide a wealth of information to them. Hackers are willing to go exceedingly far just to get their hands on these credentials--including physically altering the devices themselves to install skimmers and other technology on them. Unless you know what to look for, it can be difficult to tell if a machine has been tampered with.

For example, this news article from this past July shows a rather troublesome case of ATM skimming. The device used is a piece of plastic that slips right over the ATM card reader, and it’s designed to do so without being seen by the user. If you’re not paying attention, you could accidentally expose your credentials directly to the hacker.

There are a considerable amount of cases that involve a hacker installing custom hardware onto ATMs that can wirelessly transmit credentials, who might be lurking somewhere nearby. They can then harvest credentials at their leisure.

What would you do if you took a look at your bank account and found that you no longer have a balance in your checking account? What if you wound up going into debt because of this? What if someone has stolen your identity and is making purchases in foreign countries? The best way to keep this from happening is to be careful of ATM skimmers in the first place. Keep the following tips in mind when using an ATM.

  • Cameras surrounding the ATM: Before you stick your card in the ATM, make sure that there are several cameras pointing directly at the machine. This usually means that a hacker likely won’t try to mess with the device. ATMs usually have built-in cameras anyway, but it can never hurt to take another look around.
  • Tampering with the device: Give the device a once-over before you try to use it. Are any faceplates removed, or devices sticking out of it? If there is anything that doesn’t look natural, chances are that it’s been tampered with by a hacker.
  • Additional testing: Before you place your card in the device, take a look at the insert slot. Has it been placed on artificially? Just look for anything that’s out of place. Remember, it’s better to be safe than sorry.

What do you think about ATM skimmers? Do you think you can identify threats to your financial credentials? To learn more, reach out to us at 800-340-0505.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, 18 November 2017

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Cloud Privacy Best Practices Software Hackers Google Malware Business Computing Microsoft Internet Windows 10 Computer Hosted Solutions Innovation Backup Productivity User Tips Business Management Business Network Security Windows Smartphone Productivity Hardware Disaster Recovery Virtualization Efficiency Apps Law Enforcement Email Small Business Business Continuity Mobile Devices Managed IT Services IT Support VoIP Cybersecurity Telephone Systems Miscellaneous Ransomware Money Android Operating System Mobility Cybercrime Microsoft Office Quick Tips communications Chrome Mobile Device Management Health Cloud Computing Information Technology Passwords Google Drive Saving Money Application Data Backup Communication Office 365 Password Unsupported Software Wireless IT Services Workplace Tips Social Outsourced IT Data Recovery Browser Government BDR USB Shortcut Upgrade Holiday Data Management Work/Life Balance Facebook Wi-Fi Server Current Events Managed Service Provider Data Security Computers Smartphones Best Practice Politics Hacking Risk Management Managed IT Gadgets Save Money App Office tips Social Media Windows 10 Artificial Intelligence Data Storage Hosted Solution DDoS Mobile Computing Alert Vulnerability Search Samsung Identity Theft The Internet of Things Flexibility Managed IT Services Audit History End of Support Phishing Sports Cost Management Private Cloud Computer Care HaaS Recovery Going Green Update Automation Apple Antivirus Personal Information Google Docs Office Collaboration Transportation WiFi Internet Exlporer Cleaning Streaming Media Bandwidth User Error Television Battery Encryption VPN Telephony Save Time Humor Remote Computing Users Employer-Employee Relationship iPhone Spam Meetings Automobile Proactive IT Internet of Things Keyboard Video Games Avoiding Downtime Tablets Legislation Chromecast Vendor Management Upgrades WIndows Server 2008 Analytics Legal NFL OneNote Trending Screen Mirroring Lithium-ion battery Consultant Patch Management Big Data iOS Word Distributed Denial of Service Hiring/Firing Bluetooth Training Worker Commute Books Marketing Router Data storage Touchscreen Outlook Windows Ink Benefits Fax Server Scalability Settings Administrator Company Culture Cast Electronic Medical Records Excel Computer Fan Google Maps Smart Technology How To Gmail Access BYOD Data Emails Sync Wearable Technology Data Loss Advertising Tech Support Webinar Reputation eWaste Files Virtual Reality Network HBO Entertainment Laptop IT solutions Adobe Running Cable Nanotechnology Microsoft Excel Wireless Technology Scam SharePoint Education Black Market IT Support Social Engineering Robot Mobile Device Data Protection Touchpad Windows 10s Applications Root Cause Analysis File Sharing Employer Employee Relationship PDF IT Management Experience Solid State Drive Licensing Augmented Reality Storage Computer Accessories Teamwork Point of Sale Instant Messaging Text Messaging Commerce SaaS IT Solutions Phone System Uninterrupted Power Supply Hacker Operating Sysytem Hard Disk Drive Travel Cortana Budget Managing Stress Unified Threat Management Music CrashOverride Comparison Disaster Specifications Sales Cache Retail Safety WannaCry Remote Monitoring Emergency Monitors Worker Relocation

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      Latest News

      Eclipse Integrated Systems launches new website!

      Eclipse Integrated Systems is proud to announce the launch of our new website at The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

      Read more ...

      Account login