ct logo wslogan

i-medIT Blog

At i-medIT, we provide a comprehensive range of computer and technology solutions to small business owners and Ambulatory Health Care entities. We specialize in helping companies focus on their business by leveraging IT to serve their goals and objectives rather than being a distraction.
Customers come to us for managed services, healthcare IT, project management, IT consulting, HIPAA Compliance, PCI Compliance, server virtualization, and data backup. These core services help our customers run their own companies and take their business goals to the next level.

Swipe With Care: Your ATM Might Be Controlled By A Hacker

Swipe With Care: Your ATM Might Be Controlled By A Hacker

One of the most enticing credentials that hackers desire is your credit card number, along with its expiration date and the code on the back. Hackers are also willing to go great lengths to achieve their goal of stealing these credentials, even so far as to make physical changes to automatic teller machines (ATMs) to do so. In fact, hackers will often install skimming devices on ATMs that are so subtle that they can be difficult to detect.

Take, for example, this news article from July 2017 that showcases a rather specific case of ATM skimming. The device in question simply slips over the ATM card reader in a discreet way to give the user the impression that they are using a legitimate machine. Any unsuspecting user could accidentally throw their credentials right to a hacker.

Furthermore, there have been cases of hackers implementing custom hardware into ATMs designed to harvest credentials. These devices are often installed onto ATMs so that they can wirelessly transmit credentials, to perpetrators lurking nearby. Either way, the result is the same; stolen credentials and upset victims.

Imagine waking up, checking your bank account, and noticing that you’re missing the entirety of your checking account balance. Or, even worse, finding out that your account has sunk into the red because someone in a foreign country has purchased your information and used it for their own purposes. How can you keep this from happening to you? The easiest way is to be wary of ATM skimmers in the first place. You should keep the following in mind when using an ATM.

  • Cameras surrounding the machine: If you are in an area where there are plenty of cameras, there will be less of a chance that the ATM will have been tampered with. In fact, most ATMs actually have built-in cameras, but it helps to have some extra caution to take a look around whenever you want to use one.
  • Tampering with the device: Examine the device before you use it. Are there any issues with the way it looks? Are any faceplates removed or devices plugged into it? If there are, you know that it’s not a machine that you can trust.
  • Additional “testing”: Before you insert your card into the device, try jostling the slot to see if it’s something that was artificially placed over the actual reader. Carefully inspect the machine before you insert your card. Spending a few moments to check the device before using it can save you a whole lot of pain in the long run.

What are your thoughts on ATM skimmers? Are you confident that you can identify one that has been tampered with? Leave your thoughts in the comments.



No comments made yet. Be the first to submit a comment

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Google Privacy Business Computing Hackers Microsoft Cloud Backup Innovation Small Business Email Smartphones Hardware Android Business Cybercrime Software Windows Data Backup Mobile Devices Malware Network Security Data Ransomware Efficiency How To VoIP Internet Computers Business Continuity Browser Cybersecurity User Tips Cloud Computing Managed IT Services Productivity Social Engineering Business Management Chrome Collaboration Data Breach Telephone Systems Spam Managed IT Services Smartphone Data Recovery Internet of Things Computer Communication Operating System Social Media Server App Automation Disaster Recovery Safety Windows 10 Money Bring Your Own Device Two-factor Authentication Mobile Device Management Gadgets Law Enforcement Upgrade Outsourced IT Alert Comparison Data Security Artificial Intelligence Physical Security Vulnerability Remote Monitoring Downtime Business Intelligence Private Cloud Google Drive Windows 10 Recovery Wi-Fi Public Cloud CES Quick Tips Communications Office 365 Saving Money BDR Network Internet Exlporer Data Storage Data storage Word Save Money IT Management Passwords Router Government Gmail OneNote IT Plan The Internet of Things Unsupported Software Virtualization Miscellaneous Bandwidth Hosted Solutions Phishing Redundancy Spam Blocking Avoiding Downtime Flexibility iPhone Black Market Digital Signature NarrowBand BYOD Amazon Web Services Data Management webinar Sync Internet exploMicrosoft Marketing Hacking Recycling Office Tips Windows 10s Computer Care Networking Managed Service Provider Meetings Specifications Wireless Technology Online Shopping Conferencing Hiring/Firing Advertising eWaste Cleaning Automobile Samsung IBM Legal Patch Management Sports HBO Evernote Emails Telephony Criminal Tech Support Solid State Drive Update Work/Life Balance Value Keyboard Supercomputer Scam Health Robot Data loss Millennials Wireless Charging Skype Facebook Laptop Shadow IT Audit Microsoft Office Workforce Budget Frequently Asked Questions Screen Mirroring Chromecast Cortana Start Menu Apps Hybrid Cloud Touchpad Content Management Computer Fan Google Docs Cast Telecommuting Excel Files Google Apps Netflix Tools PDF Office Blockchain FENG Website Remote Work Current Events Tip of the week History Employer-Employee Relationship DDoS IT Support Password Relocation HIPAA Voice over Internet Protocol Identity Theft Knowledge Windows Server 2008 Outlook Workers Managed IT Human Resources YouTube Credit Cards Network Congestion Windows 7 User Error Humor Infrastructure Settings Botnet HaaS Staff Multi-Factor Security Fraud IT Consultant Flash IT Services Productivity Reputation Password Manager Travel Holiday Big Data Apple Data Protection Root Cause Analysis Trending Software Tips Amazon Electronic Medical Records End of Support Monitor Customer Going Green Business Mangement Uninterrupted Power Supply Charger Books Save Time Worker Commute Risk Management Mobility Emergency Encryption Search Politics How to Employer Employee Relationship Best Practice Webinar Computer Accessories WiFi Loyalty Experience Mobile Device Transportation VPN IT solutions Bluetooth SaaS Music Video Games Benefits Remote Computing Battery Scalability Firewall Information Technology Education Worker Thank You Content Assessment Wearable Technology Workplace Tips Smart Technology Computing Infrastructure Rootkit Congratulations Audiobook Television Techology USB Instant Messaging Two Factor Authentication Applications Training Entertainment Public Computer Troubleshooting CrashOverride Wireless Users Vendor Management IT Support Virtual Reality