Contact Us Today! 800-626-8277

One World Technology Inc. Blog

One World Technology Inc. has been serving the Medina area since 2012, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Swipe With Care: Your ATM Might Be Controlled By A Hacker

Swipe With Care: Your ATM Might Be Controlled By A Hacker

One of the most enticing credentials that hackers desire is your credit card number, along with its expiration date and the code on the back. Hackers are also willing to go great lengths to achieve their goal of stealing these credentials, even so far as to make physical changes to automatic teller machines (ATMs) to do so. In fact, hackers will often install skimming devices on ATMs that are so subtle that they can be difficult to detect.

Take, for example, this news article from July 2017 that showcases a rather specific case of ATM skimming. The device in question simply slips over the ATM card reader in a discreet way to give the user the impression that they are using a legitimate machine. Any unsuspecting user could accidentally throw their credentials right to a hacker.

Furthermore, there have been cases of hackers implementing custom hardware into ATMs designed to harvest credentials. These devices are often installed onto ATMs so that they can wirelessly transmit credentials, to perpetrators lurking nearby. Either way, the result is the same; stolen credentials and upset victims.

Imagine waking up, checking your bank account, and noticing that you’re missing the entirety of your checking account balance. Or, even worse, finding out that your account has sunk into the red because someone in a foreign country has purchased your information and used it for their own purposes. How can you keep this from happening to you? The easiest way is to be wary of ATM skimmers in the first place. You should keep the following in mind when using an ATM.

  • Cameras surrounding the machine: If you are in an area where there are plenty of cameras, there will be less of a chance that the ATM will have been tampered with. In fact, most ATMs actually have built-in cameras, but it helps to have some extra caution to take a look around whenever you want to use one.
  • Tampering with the device: Examine the device before you use it. Are there any issues with the way it looks? Are any faceplates removed or devices plugged into it? If there are, you know that it’s not a machine that you can trust.
  • Additional “testing”: Before you insert your card into the device, try jostling the slot to see if it’s something that was artificially placed over the actual reader. Carefully inspect the machine before you insert your card. Spending a few moments to check the device before using it can save you a whole lot of pain in the long run.

What are your thoughts on ATM skimmers? Are you confident that you can identify one that has been tampered with? Leave your thoughts in the comments.

Tip of the Week: Give Your Desktop Some TLC
3 Phishing Scams You Might Have Missed in 2017
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 23 February 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Privacy Best Practices Cloud Technology Network Security Managed IT Services Business Computing Backup Hackers Software Outsourced IT Business Microsoft Malware Business Continuity Hosted Solutions VoIP Disaster Recovery Google Email Windows 10 Data Backup Mobile Devices Data IT Support Smartphones Innovation Efficiency Saving Money Hardware Small Business Alert Android Communications Productivity Cybercrime Office Computer Ransomware Browser Cloud Computing Server Business Management IT Services Data Recovery Computers Passwords User Tips Telephone Systems Chrome Managed IT Law Enforcement Virtualization Mobility Cybersecurity How To Work/Life Balance BDR Firewall Internet Health Budget Avoiding Downtime Internet of Things Communication Smartphone Wi-Fi Save Money Flexibility Quick Tips Holiday Hacking Social Engineering Collaboration Office Tips Windows App Private Cloud Remote Monitoring Password Productivity Social Media Managed IT Services Spam Office 365 Miscellaneous Proactive IT Recovery Data Security Mobile Device Management Two-factor Authentication Data Breach HaaS Information Technology Bring Your Own Device Business Intelligence Phishing Router Value Facebook Compliance Gadgets Artificial Intelligence Money HIPAA Electronic Medical Records Workers Charger Vulnerability BYOD Content Filtering Mobile Device Computing Infrastructure Black Market Business Owner Hiring/Firing Big Data Marketing Keyboard Document Management CES Google Drive Government Identity Theft Word Save Time Solid State Drive Credit Cards Computer Care History End of Support Data Storage Employer-Employee Relationship Network Remote Computing Bandwidth Patch Management Redundancy Apps Windows 10 Automobile Data Protection Worker Scam Risk Management Workplace Tips Battery OneNote Data Management IT Management Comparison Managed Service Provider Spam Blocking SaaS Two Factor Authentication IT Plan Training Upgrade Operating System Public Cloud Applications Microsoft Office Unsupported Software Legal Automation Assessment Start Menu Search Windows 10s Wireless Charging Virtual Reality Recycling Techology Current Events Hybrid Cloud Google Docs Humor Software Tips Best Practice Workforce Windows Server 2008 Television Colocation Mobile How to Fiber-Optic Worker Commute Meetings eWaste Knowledge Website Physical Security Telecommuting Windows 7 Public Computer Professional Services Audit Cables Data loss Criminal Network Congestion PDF Voice over Internet Protocol Content Wireless Technology Emails Remote Work Unified Threat Management Regulations hacker Tools Shadow IT Unified Communications Screen Mirroring Multi-Factor Security Employer Employee Relationship Books Audiobook HBO Hard Drives Cleaning Files Theft Internet Exlporer Experience Computer Fan Cast Content Management Leadership Trending Computer Accessories Servers Entertainment Video Games Cortana Safety Botnet Downtime Music The Internet of Things Blockchain Lifestyle Bluetooth Emergency Flash Netflix Fraud Samsung User Error Google Apps Internet exploMicrosoft Travel Wearable Technology FENG Human Resources Mobile Computing Apple Scalability Settings Amazon Infrastructure Networking USB Data Warehousing Staff webinar Wireless iPhone Outlook Sync Amazon Web Services Loyalty Password Manager IBM Advertising Software as a Service Troubleshooting Conferencing Rootkit Frequently Asked Questions Transportation Telephony Politics Instant Messaging Online Shopping Business Mangement Supercomputer Update Relocation Education Users IT Support Specifications Excel Benefits Skype Evernote Root Cause Analysis Gmail Hosted Solution Smart Technology Millennials Vendor Management Tip of the week Webinar IT solutions Robot Digital Signature CrashOverride WiFi

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *