(703) 288-9767    NTC Store
NTConnections Blog

NTConnections has been serving the Reston area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Swipe With Care: Your ATM Might Be Controlled By A Hacker

One of the most enticing credentials that hackers desire is your credit card number, along with its expiration date and the code on the back. Hackers are also willing to go great lengths to achieve their goal of stealing these credentials, even so far as to make physical changes to automatic teller machines (ATMs) to do so. In fact, hackers will often install skimming devices on ATMs that are so subtle that they can be difficult to detect.

Take, for example, this news article from July 2017 that showcases a rather specific case of ATM skimming. The device in question simply slips over the ATM card reader in a discreet way to give the user the impression that they are using a legitimate machine. Any unsuspecting user could accidentally throw their credentials right to a hacker.

Furthermore, there have been cases of hackers implementing custom hardware into ATMs designed to harvest credentials. These devices are often installed onto ATMs so that they can wirelessly transmit credentials, to perpetrators lurking nearby. Either way, the result is the same; stolen credentials and upset victims.

Imagine waking up, checking your bank account, and noticing that you’re missing the entirety of your checking account balance. Or, even worse, finding out that your account has sunk into the red because someone in a foreign country has purchased your information and used it for their own purposes. How can you keep this from happening to you? The easiest way is to be wary of ATM skimmers in the first place. You should keep the following in mind when using an ATM.

  • Cameras surrounding the machine: If you are in an area where there are plenty of cameras, there will be less of a chance that the ATM will have been tampered with. In fact, most ATMs actually have built-in cameras, but it helps to have some extra caution to take a look around whenever you want to use one.
  • Tampering with the device: Examine the device before you use it. Are there any issues with the way it looks? Are any faceplates removed or devices plugged into it? If there are, you know that it’s not a machine that you can trust.
  • Additional “testing”: Before you insert your card into the device, try jostling the slot to see if it’s something that was artificially placed over the actual reader. Carefully inspect the machine before you insert your card. Spending a few moments to check the device before using it can save you a whole lot of pain in the long run.

What are your thoughts on ATM skimmers? Are you confident that you can identify one that has been tampered with? Leave your thoughts in the comments.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 19 November 2017

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Cloud Best Practices Privacy Hackers Business Computing Productivity Microsoft Backup Malware Hosted Solutions Internet Google Efficiency Mobile Devices IT Support Business VoIP Managed Service Provider Miscellaneous IT Services Server Workplace Tips Business Continuity Disaster Recovery Network Innovation Data Upgrade Hardware Email Software Saving Money Business Management Communication Computer Windows Save Money Mobile Device Management User Tips Microsoft Office Network Security Virtualization Browser Smartphones Android Windows 10 WiFi Smartphone Managed IT Services Holiday Hacking BYOD Social Media Operating System Mobile Computing communications IT Solutions Cybercrime Chrome Small Business Application Apple Outsourced IT Proactive IT Remote Monitoring Avoiding Downtime Computers The Internet of Things Big Data Alert Ransomware Quick Tips Data Backup Automation Information Technology Passwords Office Marketing Budget Collaboration Bring Your Own Device VPN Managed IT Services Recovery spam Social Engineering Employer-Employee Relationship Going Green Remote Computing Mobility Health Vendor Management iPhone Cybersecurity Gadgets Save Time Firewall Telephone Systems App Managed IT Wireless Technology User Error PowerPoint Website Excel Phone System Antivirus Content Filtering Office Tips Downtime History Tablet Lithium-ion battery Analytics Router Gmail Retail Memory Search Private Cloud Bandwidth Compliance Networking Mouse Redundancy Office 365 IT Support Humor Two-factor Authentication Saving Time Statistics Internet of Things Document Management Data Storage Risk Management Internet Exlporer Online Currency Word Data storage Biometrics Windows 10 Outlook Business Owner Printer Money Flexibility Hard Drives Current Events Administration Facebook Data Recovery Maintenance Entertainment Running Cable Physical Security DDoS Value Skype Unsupported Software BDR Unified Threat Management Robot Google Drive Public Cloud Mobile Office Environment Customer Relationship Management Intranet Phishing Vulnerability SaaS How To Artificial Intelligence Best Available Data Security People Safety Government Programming Network Congestion Meetings Trending HaaS Apps IT Consultant Cloud Computing Fax Server Law Enforcement Black Market Data Management Solid State Drive Tip of the week Shadow IT Applications User Wireless Files Science Tools Productivity Streaming Media Instant Messaging Company Culture Licensing FENG Data Protection Windows 8.1 Update Samsung Windows Server 2008 Wi-Fi Shortcut SharePoint Colocation Twitter Windows 8 Workers Business Intelligence Encryption Bluetooth Crowdfunding Windows 7 Sports eWaste Computing Infrastructure Tablets Botnet Monitor Hosted Solution Data Warehousing Notifications OneNote USB Regulations YouTube Wearable Technology End of Support Travel Print Server Reputation IT Management Windows Media Player Social Servers NarrowBand Work/Life Balance Internet exploMicrosoft Customers Root Cause Analysis Computer Repair IT Plan Best Practice Social Networking Net Neutrality Hiring/Firing Flash Chromecast WIndows 7 Patch Management Advertising Analyitcs Software as a Service Data loss Managing Stress Settings Sync Laptop Scam Distributed Denial of Service Update Touchscreen LinkedIn Software Tips Virus Virtual Desktop IT service Human Resources Telephony Touchpad Relocation Hybrid Cloud Virtual Reality Debate Google Docs Computer Care Uninterrupted Power Supply Computer Accessories Training Domains Start Menu HIPAA Audit IaaS Bloatware Spam Blocking Voice over Internet Protocol Video Surveillance HBO Cleaning Cameras Customer Service Consultant Mobile Screen Mirroring Entrepreneur Education Multi-Factor Security Frequently Asked Questions Tech Support Printer Server Hacker Professional Services Cast Worker Commute Cost Management Piracy Computer Fan Lifestyle Assessment Music Password Television Troubleshooting Electronic Medical Records Techology Comparison Public Computer Specifications Employer Employee Relationship Legal Data Breach Automobile Emails Books CrashOverride Mobile Device IBM Emergency Webinar Worker Users Supercomputer Content IT solutions Rootkit Video Games Knowledge Audiobook Netflix Charger Scalability Politics Transportation How to webinar Benefits PDF Loyalty Conferencing Keyboard Smart Technology Windows 10s Battery Experience Two Factor Authentication