(703) 288-9767    NTC Store
NTConnections Blog

NTConnections has been serving the Reston area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Swipe With Care: Your ATM Might Be Controlled By A Hacker

Swipe With Care: Your ATM Might Be Controlled By A Hacker

One of the most enticing credentials that hackers desire is your credit card number, along with its expiration date and the code on the back. Hackers are also willing to go great lengths to achieve their goal of stealing these credentials, even so far as to make physical changes to automatic teller machines (ATMs) to do so. In fact, hackers will often install skimming devices on ATMs that are so subtle that they can be difficult to detect.

Take, for example, this news article from July 2017 that showcases a rather specific case of ATM skimming. The device in question simply slips over the ATM card reader in a discreet way to give the user the impression that they are using a legitimate machine. Any unsuspecting user could accidentally throw their credentials right to a hacker.

Furthermore, there have been cases of hackers implementing custom hardware into ATMs designed to harvest credentials. These devices are often installed onto ATMs so that they can wirelessly transmit credentials, to perpetrators lurking nearby. Either way, the result is the same; stolen credentials and upset victims.

Imagine waking up, checking your bank account, and noticing that you’re missing the entirety of your checking account balance. Or, even worse, finding out that your account has sunk into the red because someone in a foreign country has purchased your information and used it for their own purposes. How can you keep this from happening to you? The easiest way is to be wary of ATM skimmers in the first place. You should keep the following in mind when using an ATM.

  • Cameras surrounding the machine: If you are in an area where there are plenty of cameras, there will be less of a chance that the ATM will have been tampered with. In fact, most ATMs actually have built-in cameras, but it helps to have some extra caution to take a look around whenever you want to use one.
  • Tampering with the device: Examine the device before you use it. Are there any issues with the way it looks? Are any faceplates removed or devices plugged into it? If there are, you know that it’s not a machine that you can trust.
  • Additional “testing”: Before you insert your card into the device, try jostling the slot to see if it’s something that was artificially placed over the actual reader. Carefully inspect the machine before you insert your card. Spending a few moments to check the device before using it can save you a whole lot of pain in the long run.

What are your thoughts on ATM skimmers? Are you confident that you can identify one that has been tampered with? Leave your thoughts in the comments.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, 19 January 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Privacy Hackers Business Computing Productivity Microsoft Backup Malware Hosted Solutions Internet Google Mobile Devices Efficiency IT Support VoIP Business Managed Service Provider Email Miscellaneous IT Services Server Workplace Tips Disaster Recovery Business Continuity Upgrade Network Innovation Data Windows Hardware Software Save Money Saving Money Business Management Network Security Communication Computer Android Mobile Device Management Smartphones Holiday User Tips Microsoft Office Smartphone Browser Virtualization communications Managed IT Services Windows 10 Outsourced IT WiFi Hacking Chrome Data Backup BYOD Social Media Operating System Computers Mobile Computing IT Solutions Application Alert Small Business Apple Proactive IT Remote Monitoring Avoiding Downtime Cybercrime Big Data The Internet of Things Ransomware Quick Tips Social Engineering Automation Employer-Employee Relationship Information Technology Office Passwords Budget Collaboration Marketing Managed IT Services Recovery spam Data Recovery Telephone Systems Gadgets Health Mobility Going Green Bring Your Own Device Remote Computing VPN Vendor Management Save Time Cybersecurity Firewall App iPhone BDR Bandwidth Compliance How To Managed IT Wireless Technology Cloud Computing User Error Two-factor Authentication PowerPoint Windows 10 Website Excel Risk Management Phone System Office Tips Content Filtering Downtime Antivirus History Tablet Gmail Lithium-ion battery Value Memory Retail Search Analytics Router Private Cloud Vulnerability Networking Mouse Redundancy Artificial Intelligence IT Support Office 365 Internet of Things Data Storage Internet Exlporer Workers Word Data storage Biometrics Saving Time Business Intelligence Business Owner Outlook Document Management Online Currency OneNote Flexibility Money Hard Drives Printer IT Management Work/Life Balance Facebook Administration Entertainment Running Cable Current Events Physical Security DDoS Unified Threat Management Robot Skype Maintenance Unsupported Software Mobile Office Environment Google Drive Public Cloud Customer Relationship Management Phishing SaaS Identity Theft Best Available Data Security People Intranet Safety Programming Government Network Congestion Credit Cards Trending Meetings HaaS Fax Server Black Market Law Enforcement Data Management Solid State Drive Humor Statistics IT Consultant Apps Instant Messaging Licensing FENG Data Protection Productivity Streaming Media Password Wi-Fi Shortcut Amazon Web Services Samsung Windows Server 2008 Password Manager SharePoint Colocation Twitter Windows 8 Comparison Encryption Windows 7 Sports Bluetooth Company Culture Online Shopping Crowdfunding Windows 8.1 Update Botnet Monitor Hosted Solution eWaste Computing Infrastructure Tablets Specifications Data Warehousing Notifications Regulations YouTube USB Evernote Travel Reputation Wearable Technology End of Support Mobile Device Windows Media Player Social Millennials Servers NarrowBand Wireless Charging Customers Internet exploMicrosoft Best Practice Social Networking Hiring/Firing Root Cause Analysis Workforce Print Server IT Plan Flash Chromecast WIndows 7 Fiber-Optic Analyitcs Software as a Service Patch Management Advertising Data loss Telecommuting Computer Repair Sync Laptop Managing Stress Settings Net Neutrality Cables Update Scam Distributed Denial of Service Virus Virtual Desktop Remote Work LinkedIn Charger Software Tips Telephony Touchpad IT service Human Resources Unified Communications Virtual Reality Debate Google Docs Relocation Hybrid Cloud Uninterrupted Power Supply Computer Accessories Training Computer Care Start Menu HIPAA Domains Touchscreen Theft Bloatware Spam Blocking Voice over Internet Protocol Audit IaaS Cleaning Cameras Customer Service Video Surveillance HBO Mobile Keyboard Consultant Cortana Entrepreneur Education Multi-Factor Security Screen Mirroring Tech Support Printer Server Fraud Frequently Asked Questions Professional Services Hacker Google Apps Worker Commute Cost Management Piracy Computer Fan Lifestyle Cast Shadow IT Applications Amazon Tip of the week Tools User Wireless Files Science Infrastructure Television Troubleshooting Electronic Medical Records Techology Public Computer Employer Employee Relationship Legal Data Breach Automobile Emails Books CrashOverride IBM Webinar Emergency Worker Supercomputer Content IT solutions Video Games Rootkit Knowledge Users Audiobook Netflix Scalability Politics Transportation How to webinar Benefits PDF Loyalty Conferencing Windows 10s Smart Technology Battery Experience Two Factor Authentication Assessment Music