Contact Us Today! 800-626-8277

One World Technology Inc. Blog

One World Technology Inc. has been serving the Medina area since 2012, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Swipe With Care: Your ATM Might Be Controlled By A Hacker

Swipe With Care: Your ATM Might Be Controlled By A Hacker

One of the most enticing credentials that hackers desire is your credit card number, along with its expiration date and the code on the back. Hackers are also willing to go great lengths to achieve their goal of stealing these credentials, even so far as to make physical changes to automatic teller machines (ATMs) to do so. In fact, hackers will often install skimming devices on ATMs that are so subtle that they can be difficult to detect.

Take, for example, this news article from July 2017 that showcases a rather specific case of ATM skimming. The device in question simply slips over the ATM card reader in a discreet way to give the user the impression that they are using a legitimate machine. Any unsuspecting user could accidentally throw their credentials right to a hacker.

Furthermore, there have been cases of hackers implementing custom hardware into ATMs designed to harvest credentials. These devices are often installed onto ATMs so that they can wirelessly transmit credentials, to perpetrators lurking nearby. Either way, the result is the same; stolen credentials and upset victims.

Imagine waking up, checking your bank account, and noticing that you’re missing the entirety of your checking account balance. Or, even worse, finding out that your account has sunk into the red because someone in a foreign country has purchased your information and used it for their own purposes. How can you keep this from happening to you? The easiest way is to be wary of ATM skimmers in the first place. You should keep the following in mind when using an ATM.

  • Cameras surrounding the machine: If you are in an area where there are plenty of cameras, there will be less of a chance that the ATM will have been tampered with. In fact, most ATMs actually have built-in cameras, but it helps to have some extra caution to take a look around whenever you want to use one.
  • Tampering with the device: Examine the device before you use it. Are there any issues with the way it looks? Are any faceplates removed or devices plugged into it? If there are, you know that it’s not a machine that you can trust.
  • Additional “testing”: Before you insert your card into the device, try jostling the slot to see if it’s something that was artificially placed over the actual reader. Carefully inspect the machine before you insert your card. Spending a few moments to check the device before using it can save you a whole lot of pain in the long run.

What are your thoughts on ATM skimmers? Are you confident that you can identify one that has been tampered with? Leave your thoughts in the comments.

Tip of the Week: Give Your Desktop Some TLC
3 Phishing Scams You Might Have Missed in 2017


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, June 18 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Privacy Cloud Best Practices Technology Network Security Business Computing Managed IT Services Hackers Backup Hosted Solutions Software Malware Google VoIP Microsoft Outsourced IT Email Business Business Continuity Data Backup Data Disaster Recovery IT Support Windows 10 Cybercrime Smartphones Android Ransomware Mobile Devices Efficiency Cloud Computing Saving Money Small Business Browser Alert Internet Communications Innovation Productivity IT Services Hardware Data Recovery Business Management Computer Office Computers Internet of Things Server User Tips Cybersecurity Tech Term Managed IT Smartphone Law Enforcement BDR Virtualization Chrome Work/Life Balance Artificial Intelligence Telephone Systems Passwords How To Communication Productivity Mobility Collaboration Windows Social Engineering Data Protection App Facebook Data Security Mobile Device Management Remote Monitoring Money Private Cloud Password Social Media Firewall Office 365 Budget Health Business Intelligence Phishing Avoiding Downtime Wi-Fi Flexibility Save Money Holiday Managed IT Services Quick Tips Hacking Router Office Tips Proactive IT Gadgets Two-factor Authentication Data Breach Applications Upgrade Automation BYOD Bandwidth Mobile Device Value Recovery Miscellaneous Big Data Connectivity Compliance Document Management Identity Theft Word HaaS Bring Your Own Device Information Technology Network Spam Redundancy Apps Vulnerability Scam Automobile Risk Management Workplace Tips Battery Data Management Data loss Hiring/Firing Comparison Managed Service Provider Update Cleaning Microsoft Office Legal HIPAA Public Cloud Computer Care Data Storage Employer-Employee Relationship Content Filtering Website Windows 7 VPN Windows 10 Business Owner Computing Infrastructure Black Market Worker Keyboard PDF OneNote Marketing CES IT Management SaaS Google Drive Spam Blocking Government Two Factor Authentication Content Management Save Time Credit Cards Entertainment IT Plan Training Operating System History Solid State Drive Unsupported Software Remote Computing End of Support Smart Tech Electronic Medical Records Patch Management Workers Charger Infrastructure USB Outlook Meetings Knowledge Staff Amazon Web Services Sync Physical Security Practices iPhone Sports Public Computer Password Manager Troubleshooting Software as a Service Wireless Audit Frequently Asked Questions Network Congestion Digital Signature Transportation Online Shopping Politics Telephony Instant Messaging Advertising Emails Devices Unified Threat Management Hosted Computing Smart Office Business Mangement Education Excel Screen Mirroring Employer Employee Relationship Encryption Benefits Specifications Evernote Skype HBO Relocation Thought Leadership Inventory Paperless Office Users Gmail Hosted Solution Computer Fan Tip of the week Cast Leadership Computer Accessories Strategy Smart Technology Millennials Access Control Wireless Charging Start Menu Search Streaming Media The Internet of Things Techology Safety Recycling Google Docs Virtual Reality Workforce Windows Server 2008 Best Practice Bluetooth Analysis Samsung Authentication Fiber-Optic Mobile How to Hybrid Cloud Netflix Humor Content Filter FENG eWaste Worker Commute Telecommuting Colocation Nanotechnology Cables Professional Services Settings Storage Networking Criminal Voice over Internet Protocol Remote Work Content Regulations Data Warehousing Wireless Technology webinar Accountants Loyalty Unified Communications Tools Shadow IT Machine Learning IBM Books Multi-Factor Security Audiobook hacker Conferencing Rootkit Theft Experience Addiction Files YouTube Supercomputer Trending Hard Drives Servers Video Games Internet Exlporer IT Support IoT Cache Cortana Music Botnet Root Cause Analysis Blockchain Emergency Lifestyle Fraud Flash Downtime Vendor Management Wireless Internet Assessment Google Apps Wearable Technology Travel Windows 10s User Error Current Events Human Resources Mobile Computing Amazon Software Tips Scalability Internet exploMicrosoft Insurance Apple Wire Television HVAC Webinar WiFi IT solutions Students Healthcare Electronic Health Records Twitter CrashOverride Company Culture Managing Stress Robot

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *