Contact us today!

Network Solutions Unlimited Blog

Network Solutions Unlimited has been serving the Decatur area since 2013, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Scammers and Skimmers Are a Bad Combination

Considering how often hackers target financial credentials like credit card numbers and expiration dates, it’s not surprising that ATMs can provide a wealth of information to them. Hackers are willing to go exceedingly far just to get their hands on these credentials--including physically altering the devices themselves to install skimmers and other technology on them. Unless you know what to look for, it can be difficult to tell if a machine has been tampered with.

For example, this news article from this past July shows a rather troublesome case of ATM skimming. The device used is a piece of plastic that slips right over the ATM card reader, and it’s designed to do so without being seen by the user. If you’re not paying attention, you could accidentally expose your credentials directly to the hacker.

There are a considerable amount of cases that involve a hacker installing custom hardware onto ATMs that can wirelessly transmit credentials, who might be lurking somewhere nearby. They can then harvest credentials at their leisure.

What would you do if you took a look at your bank account and found that you no longer have a balance in your checking account? What if you wound up going into debt because of this? What if someone has stolen your identity and is making purchases in foreign countries? The best way to keep this from happening is to be careful of ATM skimmers in the first place. Keep the following tips in mind when using an ATM.

  • Cameras surrounding the ATM: Before you stick your card in the ATM, make sure that there are several cameras pointing directly at the machine. This usually means that a hacker likely won’t try to mess with the device. ATMs usually have built-in cameras anyway, but it can never hurt to take another look around.
  • Tampering with the device: Give the device a once-over before you try to use it. Are any faceplates removed, or devices sticking out of it? If there is anything that doesn’t look natural, chances are that it’s been tampered with by a hacker.
  • Additional testing: Before you place your card in the device, take a look at the insert slot. Has it been placed on artificially? Just look for anything that’s out of place. Remember, it’s better to be safe than sorry.

What do you think about ATM skimmers? Do you think you can identify threats to your financial credentials? To learn more, reach out to us at 217-428-6449.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, 21 November 2017

Captcha Image

Mobile? Grab this Article!


Tag Cloud

Rootkit Artificial Intelligence Business Computing App Backup Server USB Worker Commute Google Drive Passwords Android Software as a Service Patch Management Unified Threat Management Regulation Outsourced IT Office Smart Technology iPhone Automation Wireless Technology Microsoft Public Computer Money Cybercrime Computer Care Data Best Practice Outlook How to Sync Augmented Reality Cost Management Government Automobile Hosted Solution IT Services Cybersecurity Reputation Entertainment Document Management Excel NFL Managed IT Service Hardware Saving Money Public Cloud Computer Fan Budget Managed IT End of Support Computers Politics Troubleshooting Computer Accessories Gmail IT Management Specifications Managed Service Provider Instant Messaging Efficiency Data Security Humor Hard Disk Drive Cortana Samsung Monitors Holiday Big Data Customer Files Audit Save Time Data Backup Innovation Worker Screen Mirroring Relocation Data Storage Solid State Drive Law Enforcement Emergency Content IT Support Thank You Avoiding Downtime Retail Productivity WiFi Telephone Systems Flexibility Privacy Password Internet of Things Physical Security IT Support Disaster Recovery Business Owner Miscellaneous File Sharing Business Management Email Data Management Small Business Phone System Data storage Windows Ink Computing Infrastructure Content Filtering Virtual Reality Social Media Techology Google Training Bandwidth Comparison Chromecast Vulnerability Legal Social Engineering Shadow IT HIPAA Keyboard Shortcut Software Root Cause Analysis WannaCry Mobility Mobile Employer-Employee Relationship Hackers HaaS Transportation Adobe CrashOverride Assessment Downtime Meetings The Internet of Things Cleaning IT Solutions Collaboration Experience Communications Apple Smartphones Work/Life Balance Internet Black Market HBO Two-factor Authentication Save Money Recovery Remote Computing Administration Two Factor Authentication Loyalty Data Breach BDR Windows 10 Technology Charger Tablets Network Security Network User Error Managed IT Services Video Games Office Tips Business Intelligence Spam Blocking Commerce Hard Drives Monitor PDF Settings Chrome Hiring/Firing Dark Web SaaS Alert Employer Employee Relationship BYOD Upgrade iOS Vendor Management Unsupported Software Books Licensing Business Continuity WIndows Server 2008 Application Windows 10 Battery Search Firewall Webinar Travel Google Maps Health Malware Bluetooth Microsoft Excel VoIP Remote Monitoring Mobile Device Management How To History Ransomware Google Docs Mobile Devices Cache Compliance Proactive IT Personal Information Office 365 Consultant Microsoft Office Education hacker Going Green Marketing Safety Advertising Operating System Congratulations Robot Data Recovery Storage IT solutions Quick Tips Benefits Cloud Computing Upgrades Colocation Apps Workplace Tips Scalability Information Technology Risk Management Browser Cast Mobile Device Word Wireless Sales Electronic Medical Records Tip of the Week Hybrid Cloud Audiobook Phishing Touchpad Television Computer Productivity VPN Value Gadgets Security Legislation Lifestyle Laptop Bring Your Own Device Internet Exlporer Sports Hosted Solutions Applications Smartphone Windows Professional Services Touchscreen Wi-Fi Best Practices Managed IT Services Encryption OneNote Private Cloud Scam Redundancy Users Business User Tips Hacking Virtualization Router Emails Facebook Nanotechnology Data Protection Data Loss Windows 10s Internet exploMicrosoft Cloud Spam

Sign Up for Our Newsletter

  • Company Name *
  • First Name *
  • Last Name *