croom new

Scammers and Skimmers Are a Bad Combination

Scammers and Skimmers Are a Bad Combination

Considering how often hackers target financial credentials like credit card numbers and expiration dates, it’s not surprising that ATMs can provide a wealth of information to them. Hackers are willing to go exceedingly far just to get their hands on these credentials--including physically altering the devices themselves to install skimmers and other technology on them. Unless you know what to look for, it can be difficult to tell if a machine has been tampered with.

For example, this news article from this past July shows a rather troublesome case of ATM skimming. The device used is a piece of plastic that slips right over the ATM card reader, and it’s designed to do so without being seen by the user. If you’re not paying attention, you could accidentally expose your credentials directly to the hacker.

There are a considerable amount of cases that involve a hacker installing custom hardware onto ATMs that can wirelessly transmit credentials, who might be lurking somewhere nearby. They can then harvest credentials at their leisure.

What would you do if you took a look at your bank account and found that you no longer have a balance in your checking account? What if you wound up going into debt because of this? What if someone has stolen your identity and is making purchases in foreign countries? The best way to keep this from happening is to be careful of ATM skimmers in the first place. Keep the following tips in mind when using an ATM.

  • Cameras surrounding the ATM: Before you stick your card in the ATM, make sure that there are several cameras pointing directly at the machine. This usually means that a hacker likely won’t try to mess with the device. ATMs usually have built-in cameras anyway, but it can never hurt to take another look around.
  • Tampering with the device: Give the device a once-over before you try to use it. Are any faceplates removed, or devices sticking out of it? If there is anything that doesn’t look natural, chances are that it’s been tampered with by a hacker.
  • Additional testing: Before you place your card in the device, take a look at the insert slot. Has it been placed on artificially? Just look for anything that’s out of place. Remember, it’s better to be safe than sorry.

What do you think about ATM skimmers? Do you think you can identify threats to your financial credentials? To learn more, reach out to us at 800-340-0505.

Business Continuity Allows You to Keep Your Busine...
Tip of the Week: How To Put A Table Of Contents In...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, October 16 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Business Computing Network Security Google Hackers Internet Malware Software Business Management User Tips Microsoft Tech Term Hosted Solutions Productivity Computer Innovation Efficiency Backup Windows 10 Browser Cybersecurity Productivity Business Apps Managed IT Services Saving Money Windows Smartphones Mobile Devices Email Cybercrime Virtualization Smartphone VoIP Hardware Communication Small Business Android Workplace Tips Data Backup Operating System communications Internet of Things Law Enforcement Collaboration Disaster Recovery Data Recovery Passwords Data Security IT Support Microsoft Office Ransomware Miscellaneous Business Continuity Holiday Mobility Network Data Gadgets Chrome IT Support Users Server Social Media Office 365 Update Cloud Computing Mobile Device Management Telephone Systems BDR Wireless Phishing Quick Tips Money Risk Management Social Vulnerability Unsupported Software Mobile Device Application Cost Management Wi-Fi App Employer-Employee Relationship Information Technology Health Outsourced IT Government Password Best Practice IT Services Google Drive Windows 10 Proactive IT Sports User Error Shortcut Work/Life Balance Blockchain Facebook Automation Current Events Office tips Patch Management Managed IT Services Alert USB Antivirus Managed IT Artificial Intelligence Computers Two-factor Authentication Hacking Upgrade Identity Theft Data Management Spam Politics Streaming Media Bandwidth Save Money Managed Service Provider End of Support Battery Remote Computing Marketing Office Television Recovery Private Cloud Wireless Charging Cleaning Google Docs Samsung OneNote HaaS Fraud iPhone Managing Stress Tech Support Gmail Data Storage Automobile Meetings Personal Information Touchscreen Transportation Data Protection Internet Exlporer Maintenance Audit Going Green Apple Mobile Security Legal Save Time Wireless Technology Company Culture The Internet of Things Information Analytics Search Hosted Solution SaaS Commerce eWaste Excel Networking WiFi Flexibility Storage Mobile Computing DDoS Business Intelligence Computer Care VPN Router Telephony Humor Devices Encryption Social Engineering Compliance History Cortana Charger Data Theft Virtual Assistant Books Webinar Data Loss IT budget Downloads Vendor Management Managed IT Service Experience Upgrades Uninterrupted Power Supply Operating Sysytem Tablets Spyware Error Instant Messaging Access Conferencing Updates Hard Drive How To Budget Legislation Fax Server RAM Text Messaging WIndows Server 2008 Computing Plug-In IT solutions Trends Troubleshooting Point of Sale Cables Phone System Consultant Avoiding Downtime NFL Internet Explorer Microsoft Office 365 Scam Nanotechnology HBO Gifts Teamwork Adobe Microsoft Word Chromebook Reporting Hiring/Firing iOS Chromecast Comparison Microsoft Teams Data Breach App store Remote Monitoring and Management Video Games Windows 10s Files Microsoft Excel Identities A.I. Advertising Training Virus Voice over Internet Protocol Music Word Edge Wearable Technology Threat Access Control Employer Employee Relationship Root Cause Analysis Credit Cards Laptop Applications Printing Medical IT Reputation Benefits Screen Mirroring Specifications G Suite Outlook Evernote Analysis Solid State Drive File Sharing Language Movies Settings Proactive Electronic Medical Records Windows Ink Ciminal PowerPoint Authentication Virtual Reality Computer Accessories Augmented Reality Robot IT Management Entertainment Touchpad Licensing Device Security Google Assistant GDPR Black Market Smart Technology Computer Fan Cast Sales Bring Your Own Device Identity Managed Service Hacker Hard Disk Drive Trending Data storage IT Solutions FAQ Websites Amazon Big Data Safety Emails Google Maps Project Management Running Cable Connectivity Authorization Education Lithium-ion battery Hybrid Cloud Unified Threat Management Travel Value Dark Web WannaCry Administrator BYOD Retail SharePoint Sync Workers Data Privacy Scalability Keyboard Bluetooth Distributed Denial of Service Unified Communications PDF Worker Commute Emergency Printers CrashOverride Twitter Relocation Monitors Regulation Worker Disaster Cache Remote Monitoring

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      Latest News

      Eclipse Integrated Systems launches new website!

      Eclipse Integrated Systems is proud to announce the launch of our new website at The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

      Read more ...

      Account login