Contact Us Today! 800-626-8277

One World Technology Inc. Blog

One World Technology Inc. has been serving the Medina area since 2012, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Swipe With Care: Your ATM Might Be Controlled By A Hacker

Swipe With Care: Your ATM Might Be Controlled By A Hacker

One of the most enticing credentials that hackers desire is your credit card number, along with its expiration date and the code on the back. Hackers are also willing to go great lengths to achieve their goal of stealing these credentials, even so far as to make physical changes to automatic teller machines (ATMs) to do so. In fact, hackers will often install skimming devices on ATMs that are so subtle that they can be difficult to detect.

Take, for example, this news article from July 2017 that showcases a rather specific case of ATM skimming. The device in question simply slips over the ATM card reader in a discreet way to give the user the impression that they are using a legitimate machine. Any unsuspecting user could accidentally throw their credentials right to a hacker.

Furthermore, there have been cases of hackers implementing custom hardware into ATMs designed to harvest credentials. These devices are often installed onto ATMs so that they can wirelessly transmit credentials, to perpetrators lurking nearby. Either way, the result is the same; stolen credentials and upset victims.

Imagine waking up, checking your bank account, and noticing that you’re missing the entirety of your checking account balance. Or, even worse, finding out that your account has sunk into the red because someone in a foreign country has purchased your information and used it for their own purposes. How can you keep this from happening to you? The easiest way is to be wary of ATM skimmers in the first place. You should keep the following in mind when using an ATM.

  • Cameras surrounding the machine: If you are in an area where there are plenty of cameras, there will be less of a chance that the ATM will have been tampered with. In fact, most ATMs actually have built-in cameras, but it helps to have some extra caution to take a look around whenever you want to use one.
  • Tampering with the device: Examine the device before you use it. Are there any issues with the way it looks? Are any faceplates removed or devices plugged into it? If there are, you know that it’s not a machine that you can trust.
  • Additional “testing”: Before you insert your card into the device, try jostling the slot to see if it’s something that was artificially placed over the actual reader. Carefully inspect the machine before you insert your card. Spending a few moments to check the device before using it can save you a whole lot of pain in the long run.

What are your thoughts on ATM skimmers? Are you confident that you can identify one that has been tampered with? Leave your thoughts in the comments.

Tip of the Week: Give Your Desktop Some TLC
3 Phishing Scams You Might Have Missed in 2017
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 23 November 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Privacy Best Practices Cloud Business Computing Network Security Managed IT Services Hackers Backup Technology Software Malware Business Continuity Hosted Solutions Business Microsoft Outsourced IT Windows 10 Google VoIP Disaster Recovery IT Support Smartphones Data Efficiency Saving Money Hardware Small Business Office Alert Ransomware Mobile Devices Productivity Computer Email Browser Android Cybercrime Server Innovation Data Backup IT Services Cybersecurity Computers User Tips Communications Passwords Managed IT Business Management Mobility Law Enforcement Work/Life Balance Firewall Budget Social Media Telephone Systems Internet Health Cloud Computing Productivity Managed IT Services Avoiding Downtime Wi-Fi Communication Save Money Flexibility Virtualization Hacking Collaboration Office Tips Chrome Quick Tips App Social Engineering Remote Monitoring Facebook Password Phishing Private Cloud Office 365 Artificial Intelligence How To Recovery Miscellaneous Smartphone Bring Your Own Device HaaS Spam Holiday Proactive IT Information Technology Mobile Device Management Data Breach Router Computer Care Data Storage Money Applications Gadgets Microsoft Office Managed Service Provider Business Intelligence Value Worker Upgrade Compliance Public Cloud BYOD Content Filtering Automation Spam Blocking SaaS Business Owner Two Factor Authentication Operating System BDR Unsupported Software Computing Infrastructure Black Market Save Time Marketing Google Drive Word Government Remote Computing Patch Management Hiring/Firing History Data Security Solid State Drive Apps End of Support Scam Automobile Network Windows Workplace Tips Battery Redundancy Data Recovery Outlook Politics Instant Messaging Data Protection Education Sync The Internet of Things Safety Benefits Employer-Employee Relationship Bluetooth Wireless Software as a Service iPhone Frequently Asked Questions Netflix Samsung Comparison Advertising Telephony FENG Hosted Solution Bandwidth Smart Technology Legal Update Excel Settings HIPAA Search Specifications Virtual Reality Techology Skype Relocation Windows 10 Networking Users webinar Best Practice Data Warehousing Tip of the week Loyalty How to Worker Commute Start Menu OneNote IBM Conferencing Rootkit Mobile Device Google Docs IT Management Windows Server 2008 Hybrid Cloud Mobile Humor Big Data Supercomputer IT Support Content Training Wireless Technology Website IT Plan Colocation Windows 7 Keyboard Shadow IT Document Management Professional Services Root Cause Analysis Books Audiobook Vendor Management Voice over Internet Protocol Regulations Windows 10s Experience Assessment Current Events Electronic Medical Records PDF Tools Software Tips Workers Entertainment Charger Video Games Multi-Factor Security hacker Internet of Things Vulnerability Music Television Emergency Knowledge Meetings Physical Security Hard Drives Trending Files Internet Exlporer Servers Audit Wearable Technology Public Computer Network Congestion Botnet Data loss Emails Unified Threat Management Scalability Lifestyle Flash Downtime USB Two-factor Authentication Employer Employee Relationship Travel Screen Mirroring User Error HBO Risk Management Cleaning Mobile Computing Internet exploMicrosoft Computer Fan Troubleshooting Transportation Leadership Data Management Computer Accessories Apple Cast IT solutions WiFi CrashOverride Webinar Robot

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *