Eclipse Integrated Systems Blog

Eclipse Integrated Systems has been serving the Bridgewater area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Scammers and Skimmers Are a Bad Combination

Scammers and Skimmers Are a Bad Combination

Considering how often hackers target financial credentials like credit card numbers and expiration dates, it’s not surprising that ATMs can provide a wealth of information to them. Hackers are willing to go exceedingly far just to get their hands on these credentials--including physically altering the devices themselves to install skimmers and other technology on them. Unless you know what to look for, it can be difficult to tell if a machine has been tampered with.

For example, this news article from this past July shows a rather troublesome case of ATM skimming. The device used is a piece of plastic that slips right over the ATM card reader, and it’s designed to do so without being seen by the user. If you’re not paying attention, you could accidentally expose your credentials directly to the hacker.

There are a considerable amount of cases that involve a hacker installing custom hardware onto ATMs that can wirelessly transmit credentials, who might be lurking somewhere nearby. They can then harvest credentials at their leisure.

What would you do if you took a look at your bank account and found that you no longer have a balance in your checking account? What if you wound up going into debt because of this? What if someone has stolen your identity and is making purchases in foreign countries? The best way to keep this from happening is to be careful of ATM skimmers in the first place. Keep the following tips in mind when using an ATM.

  • Cameras surrounding the ATM: Before you stick your card in the ATM, make sure that there are several cameras pointing directly at the machine. This usually means that a hacker likely won’t try to mess with the device. ATMs usually have built-in cameras anyway, but it can never hurt to take another look around.
  • Tampering with the device: Give the device a once-over before you try to use it. Are any faceplates removed, or devices sticking out of it? If there is anything that doesn’t look natural, chances are that it’s been tampered with by a hacker.
  • Additional testing: Before you place your card in the device, take a look at the insert slot. Has it been placed on artificially? Just look for anything that’s out of place. Remember, it’s better to be safe than sorry.

What do you think about ATM skimmers? Do you think you can identify threats to your financial credentials? To learn more, reach out to us at 800-340-0505.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, 20 April 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Privacy Cloud Hackers Business Computing Internet Software Malware Google Network Security Business Management Microsoft Windows 10 Computer Hosted Solutions User Tips Backup Innovation Productivity Productivity Business Windows Apps Email Cybersecurity Efficiency Hardware Cybercrime Smartphone Mobile Devices Operating System Virtualization Law Enforcement Disaster Recovery Browser Android Data Security Ransomware Small Business Business Continuity VoIP Managed IT Services IT Support Internet of Things Holiday Data Backup Money Server Microsoft Office Mobility Phishing Office 365 Smartphones communications Quick Tips Chrome Telephone Systems Mobile Device Management Miscellaneous Passwords Data Recovery Health Information Technology Vulnerability Saving Money Update Communication Google Drive Collaboration Password Best Practice Wi-Fi Tech Term Risk Management Application Workplace Tips Gadgets Social Wireless Unsupported Software IT Services App Government Outsourced IT Cloud Computing Spam USB Windows 10 BDR Alert Shortcut Identity Theft Upgrade Data Management Computers Work/Life Balance Facebook Two-factor Authentication Data Current Events User Error Managed Service Provider Antivirus Hacking Politics IT Support Social Media Save Money Managed IT Office tips Automobile Artificial Intelligence Legal Data Storage Search Mobile Security The Internet of Things Samsung Blockchain Cost Management Google Docs Flexibility OneNote History Going Green Managed IT Services Data Protection End of Support Apple Audit Private Cloud Sports eWaste WiFi Recovery HaaS Computer Care Streaming Media Automation Social Engineering Bandwidth Tech Support Personal Information Television Cortana Proactive IT Transportation Internet Exlporer Office Wireless Technology Network Users Cleaning Fraud Employer-Employee Relationship Meetings Encryption Patch Management VPN Telephony Battery Humor Remote Computing Hosted Solution Save Time DDoS Mobile Computing Commerce iPhone Excel Distributed Denial of Service Project Management Bluetooth Google Maps Video Games Avoiding Downtime BYOD Unified Threat Management Chromecast Music App store Retail Workers Marketing Sync Keyboard Vendor Management IT budget Fax Server Data Loss Upgrades Analytics Conferencing Updates HBO Screen Mirroring Consultant Gmail Big Data Identity Gifts Microsoft Word Adobe Router iOS Data storage Hiring/Firing Wearable Technology Training Worker Commute Identities Microsoft Excel Scalability Touchscreen Administrator Books Data Privacy Credit Cards Maintenance Applications Benefits Company Culture Language File Sharing How To Settings IT Management Access Electronic Medical Records Running Cable Device Security Licensing Computer Fan Smart Technology SharePoint Storage IT Solutions Advertising Emails Safety FAQ Devices Travel WannaCry Reputation Files Virus Webinar Charger Virtual Reality Spyware Tablets Laptop Entertainment Proactive Teamwork Legislation Black Market WIndows Server 2008 IT solutions Robot Wireless Charging Education NFL Nanotechnology Touchpad Scam Mobile Device Websites Comparison PDF Windows 10s Data Breach Edge Word Root Cause Analysis Employer Employee Relationship Experience Data Theft Specifications Instant Messaging Outlook Text Messaging Solid State Drive Evernote Uninterrupted Power Supply Point of Sale Ciminal Windows Ink Augmented Reality Operating Sysytem Computer Accessories SaaS Budget Trending Phone System Computing Sales Managing Stress Cast Networking Hard Disk Drive Lithium-ion battery Hacker CrashOverride Disaster Hard Drive Cache Remote Monitoring Emergency Monitors Worker Relocation

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      Latest News

      Eclipse Integrated Systems launches new website!

      Eclipse Integrated Systems is proud to announce the launch of our new website at The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

      Read more ...

      Account login