ct logo wslogan

i-medIT Blog

At i-medIT, we provide a comprehensive range of computer and technology solutions to small business owners and Ambulatory Health Care entities. We specialize in helping companies focus on their business by leveraging IT to serve their goals and objectives rather than being a distraction.
Customers come to us for managed services, healthcare IT, project management, IT consulting, HIPAA Compliance, PCI Compliance, server virtualization, and data backup. These core services help our customers run their own companies and take their business goals to the next level.

Swipe With Care: Your ATM Might Be Controlled By A Hacker

Swipe With Care: Your ATM Might Be Controlled By A Hacker

One of the most enticing credentials that hackers desire is your credit card number, along with its expiration date and the code on the back. Hackers are also willing to go great lengths to achieve their goal of stealing these credentials, even so far as to make physical changes to automatic teller machines (ATMs) to do so. In fact, hackers will often install skimming devices on ATMs that are so subtle that they can be difficult to detect.

Take, for example, this news article from July 2017 that showcases a rather specific case of ATM skimming. The device in question simply slips over the ATM card reader in a discreet way to give the user the impression that they are using a legitimate machine. Any unsuspecting user could accidentally throw their credentials right to a hacker.

Furthermore, there have been cases of hackers implementing custom hardware into ATMs designed to harvest credentials. These devices are often installed onto ATMs so that they can wirelessly transmit credentials, to perpetrators lurking nearby. Either way, the result is the same; stolen credentials and upset victims.

Imagine waking up, checking your bank account, and noticing that you’re missing the entirety of your checking account balance. Or, even worse, finding out that your account has sunk into the red because someone in a foreign country has purchased your information and used it for their own purposes. How can you keep this from happening to you? The easiest way is to be wary of ATM skimmers in the first place. You should keep the following in mind when using an ATM.

  • Cameras surrounding the machine: If you are in an area where there are plenty of cameras, there will be less of a chance that the ATM will have been tampered with. In fact, most ATMs actually have built-in cameras, but it helps to have some extra caution to take a look around whenever you want to use one.
  • Tampering with the device: Examine the device before you use it. Are there any issues with the way it looks? Are any faceplates removed or devices plugged into it? If there are, you know that it’s not a machine that you can trust.
  • Additional “testing”: Before you insert your card into the device, try jostling the slot to see if it’s something that was artificially placed over the actual reader. Carefully inspect the machine before you insert your card. Spending a few moments to check the device before using it can save you a whole lot of pain in the long run.

What are your thoughts on ATM skimmers? Are you confident that you can identify one that has been tampered with? Leave your thoughts in the comments.



No comments made yet. Be the first to submit a comment

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Google Hackers Privacy Cloud Backup Business Computing Microsoft Small Business Smartphones Innovation Hardware Ransomware Efficiency Malware Data Software Business Cybercrime VoIP Cybersecurity Email Internet Business Continuity Mobile Devices Managed IT Services User Tips Android Productivity Collaboration Gadgets Business Management Upgrade Computers Network Security Computer Windows Operating System Social Media Communication App How To Browser Chrome Server Automation Spam Data Breach Safety Law Enforcement Social Engineering Bring Your Own Device Data Backup Mobile Device Management Managed IT Services Miscellaneous The Internet of Things Hosted Solutions Bandwidth Artificial Intelligence Physical Security Telephone Systems Smartphone Private Cloud Redundancy Google Drive Avoiding Downtime Cloud Computing Data Storage Wi-Fi Public Cloud Windows 10 Downtime Office 365 Windows 10 Recovery Quick Tips Unsupported Software Saving Money Money Network Phishing Router Spam Blocking Government Internet Exlporer Data storage Disaster Recovery Passwords Save Money Data Security Word Outsourced IT Alert Solid State Drive Managed IT Flexibility Value iPhone Virtualization Data loss Two-factor Authentication Supercomputer Internet exploMicrosoft Scam Windows 7 Marketing Hacking Audit Botnet Managed Service Provider Screen Mirroring Multi-Factor Security Monitor Budget Advertising Flash Going Green Uninterrupted Power Supply Automobile Computer Fan Travel Black Market Cast Trending BDR NarrowBand Office Tips Netflix FENG Internet of Things Health Comparison Current Events Wireless Technology IT Support Sync Facebook Cleaning Microsoft Office Data Recovery Sports IT Management Specifications Apps Knowledge Hybrid Cloud Communications Tech Support OneNote Remote Monitoring Robot Files IT Plan Business Intelligence Network Congestion Settings Telephony Laptop Office Shadow IT Update History Chromecast Productivity IT Consultant Skype Touchpad Relocation Root Cause Analysis Software Tips Frequently Asked Questions Start Menu Google Docs User Error DDoS BYOD webinar Excel Windows 10s Tools HaaS Computer Care Meetings Website IT Services Outlook Networking Hiring/Firing Reputation Conferencing Tip of the week Vulnerability Samsung Apple Gmail Voice over Internet Protocol Humor IBM End of Support YouTube Patch Management Customer HBO Emails Windows Server 2008 Computer Accessories Worker Commute Webinar Risk Management Mobility Loyalty Search Transportation Bluetooth IT solutions Politics Legal SaaS Data Management How to Benefits Work/Life Balance Keyboard Best Practice Firewall Worker Experience Mobile Device Assessment Wearable Technology Smart Technology Rootkit Music Video Games Television USB Two Factor Authentication Battery PDF Training CrashOverride Scalability Public Computer VPN Troubleshooting Education Information Technology Password Vendor Management Content WiFi Workplace Tips Remote Computing Big Data Electronic Medical Records Computing Infrastructure Techology Charger Audiobook Instant Messaging Books Save Time Applications Thank You Entertainment Emergency Users Wireless IT Support Congratulations Holiday Employer Employee Relationship Virtual Reality