(703) 288-9767    NTC Store
NTConnections Blog

NTConnections has been serving the Reston area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Swipe With Care: Your ATM Might Be Controlled By A Hacker

Swipe With Care: Your ATM Might Be Controlled By A Hacker

One of the most enticing credentials that hackers desire is your credit card number, along with its expiration date and the code on the back. Hackers are also willing to go great lengths to achieve their goal of stealing these credentials, even so far as to make physical changes to automatic teller machines (ATMs) to do so. In fact, hackers will often install skimming devices on ATMs that are so subtle that they can be difficult to detect.

Take, for example, this news article from July 2017 that showcases a rather specific case of ATM skimming. The device in question simply slips over the ATM card reader in a discreet way to give the user the impression that they are using a legitimate machine. Any unsuspecting user could accidentally throw their credentials right to a hacker.

Furthermore, there have been cases of hackers implementing custom hardware into ATMs designed to harvest credentials. These devices are often installed onto ATMs so that they can wirelessly transmit credentials, to perpetrators lurking nearby. Either way, the result is the same; stolen credentials and upset victims.

Imagine waking up, checking your bank account, and noticing that you’re missing the entirety of your checking account balance. Or, even worse, finding out that your account has sunk into the red because someone in a foreign country has purchased your information and used it for their own purposes. How can you keep this from happening to you? The easiest way is to be wary of ATM skimmers in the first place. You should keep the following in mind when using an ATM.

  • Cameras surrounding the machine: If you are in an area where there are plenty of cameras, there will be less of a chance that the ATM will have been tampered with. In fact, most ATMs actually have built-in cameras, but it helps to have some extra caution to take a look around whenever you want to use one.
  • Tampering with the device: Examine the device before you use it. Are there any issues with the way it looks? Are any faceplates removed or devices plugged into it? If there are, you know that it’s not a machine that you can trust.
  • Additional “testing”: Before you insert your card into the device, try jostling the slot to see if it’s something that was artificially placed over the actual reader. Carefully inspect the machine before you insert your card. Spending a few moments to check the device before using it can save you a whole lot of pain in the long run.

What are your thoughts on ATM skimmers? Are you confident that you can identify one that has been tampered with? Leave your thoughts in the comments.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 24 April 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Hackers Business Computing Productivity Microsoft Backup Malware Hosted Solutions Internet Google Mobile Devices Efficiency VoIP IT Support Business IT Services Email Miscellaneous Managed Service Provider Network Security Server Innovation Network Disaster Recovery Data Business Continuity Workplace Tips Software Windows Upgrade Hardware Business Management Mobile Device Management Communication Virtualization Computer Android Save Money Saving Money Browser Smartphone Managed IT Services User Tips Smartphones Microsoft Office communications Data Backup Holiday BYOD Cybercrime WiFi Windows 10 Outsourced IT Computers Small Business Hacking Chrome Cloud Computing Big Data Social Media Remote Monitoring Operating System Mobile Computing Ransomware Apple VPN Proactive IT Managed IT Services Avoiding Downtime Application Data Recovery IT Solutions Alert Budget Collaboration Employer-Employee Relationship Information Technology Passwords Marketing Automation Internet of Things The Internet of Things Office Social Engineering Quick Tips Mobility Health BDR Gadgets Bring Your Own Device spam Going Green Remote Computing Cybersecurity Recovery Telephone Systems How To Gmail Wireless Technology iPhone Data Protection User Error Managed IT Business Intelligence Private Cloud IT Support Redundancy Save Time Firewall Two-factor Authentication Vulnerability Data Security Bandwidth Compliance Vendor Management App Antivirus Lithium-ion battery Analytics Router Tech Term PowerPoint Website Mouse Excel Phone System Content Filtering Money Downtime Windows 10 Artificial Intelligence Office 365 Data Management History Tablet Value Apps Retail Memory Search Identity Theft Document Management Office Tips Risk Management Networking Phishing Physical Security HIPAA Data Storage DDoS Current Events Robot Humor Word Comparison Google Drive Maintenance Environment Statistics Human Resources SaaS Law Enforcement Solid State Drive Training Outlook Safety Government IT Management Productivity Cleaning Intranet Meetings Flexibility Workers IT Plan HaaS Fax Server Business Owner Administration CES Black Market Unsupported Software Entertainment OneNote Running Cable Update Unified Threat Management Skype Internet Exlporer IT Consultant Mobile Device Data storage Work/Life Balance Encryption Biometrics Mobile Office Customer Relationship Management Saving Time eWaste Credit Cards Data loss Best Available Online Currency Hard Drives People Programming Public Cloud Facebook Network Congestion Printer Trending Authentication Education Amazon Tip of the week Best Practice Hybrid Cloud Social Networking Printer Server Infrastructure Computer Care Tools Chromecast Print Server Analyitcs Analysis Piracy Spam Blocking Amazon Web Services Windows Server 2008 PDF Worker Commute Settings Password Manager Laptop Keyboard Distributed Denial of Service User Accountants Licensing Online Shopping Net Neutrality Windows 7 Computer Repair Virtual Desktop IT service Business Mangement Samsung Botnet Touchpad Specifications Relocation Data Warehousing Virtual Reality Twitter Computer Fan Evernote Regulations Uninterrupted Power Supply Applications Domains Recycling Crowdfunding Travel Millennials IaaS Files Bloatware IoT FENG Wireless Charging Touchscreen Servers Password Customer Service Wi-Fi Criminal Workforce Colocation Entrepreneur Smart Tech Windows Media Player Fiber-Optic Electronic Medical Records Flash Tech Support Hacker Software as a Service Telecommuting Hosted Solution Computing Infrastructure Cost Management Insurance Hiring/Firing Cables Sync Shadow IT Legal Wireless WIndows 7 Science Content Management Remote Work Software Tips Streaming Media End of Support Instant Messaging Practices Unified Communications Telephony Shortcut SharePoint Managing Stress Windows 8 Blockchain Google Docs Internet exploMicrosoft Hosted Computing Virus Bluetooth Root Cause Analysis Theft LinkedIn Start Menu Sports Monitor Audit Tablets Staff Voice over Internet Protocol Debate Company Culture Patch Management HBO Notifications Advertising Inventory Computer Accessories USB Cortana Mobile YouTube Windows 8.1 Update Reputation Screen Mirroring Wearable Technology Digital Signature Multi-Factor Security Access Control Fraud Scam Frequently Asked Questions Social Cameras Google Apps Video Surveillance Charger Professional Services NarrowBand Lifestyle Customers Cast Consultant Strategy Transportation How to webinar Nanotechnology Benefits Loyalty Conferencing Windows 10s Smart Technology Users Battery Experience Two Factor Authentication Assessment Music Television Troubleshooting Techology Public Computer Employer Employee Relationship Automobile Data Breach Emails Books CrashOverride IBM Webinar Emergency Worker Content Supercomputer IT solutions Rootkit Video Games Audiobook Knowledge Netflix Scalability Politics