Contact us today!

Network Solutions Unlimited Blog

Network Solutions Unlimited has been serving the Decatur area since 2013, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Scammers and Skimmers Are a Bad Combination

Scammers and Skimmers Are a Bad Combination

Considering how often hackers target financial credentials like credit card numbers and expiration dates, it’s not surprising that ATMs can provide a wealth of information to them. Hackers are willing to go exceedingly far just to get their hands on these credentials--including physically altering the devices themselves to install skimmers and other technology on them. Unless you know what to look for, it can be difficult to tell if a machine has been tampered with.

For example, this news article from this past July shows a rather troublesome case of ATM skimming. The device used is a piece of plastic that slips right over the ATM card reader, and it’s designed to do so without being seen by the user. If you’re not paying attention, you could accidentally expose your credentials directly to the hacker.

There are a considerable amount of cases that involve a hacker installing custom hardware onto ATMs that can wirelessly transmit credentials, who might be lurking somewhere nearby. They can then harvest credentials at their leisure.

What would you do if you took a look at your bank account and found that you no longer have a balance in your checking account? What if you wound up going into debt because of this? What if someone has stolen your identity and is making purchases in foreign countries? The best way to keep this from happening is to be careful of ATM skimmers in the first place. Keep the following tips in mind when using an ATM.

  • Cameras surrounding the ATM: Before you stick your card in the ATM, make sure that there are several cameras pointing directly at the machine. This usually means that a hacker likely won’t try to mess with the device. ATMs usually have built-in cameras anyway, but it can never hurt to take another look around.
  • Tampering with the device: Give the device a once-over before you try to use it. Are any faceplates removed, or devices sticking out of it? If there is anything that doesn’t look natural, chances are that it’s been tampered with by a hacker.
  • Additional testing: Before you place your card in the device, take a look at the insert slot. Has it been placed on artificially? Just look for anything that’s out of place. Remember, it’s better to be safe than sorry.

What do you think about ATM skimmers? Do you think you can identify threats to your financial credentials? To learn more, reach out to us at 217-428-6449.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, 21 February 2018

Captcha Image

Mobile? Grab this Article!


Tag Cloud

Business Risk Management Social Engineering Cybercrime Humor Wireless Charging Cloud Going Green Devices Apple Application Experience Sports Touchscreen WiFi User Error Managed Service Provider Personal Information Cast Updates Telephone Systems IT Management IT Support Chromecast NFL Windows Remote Computing Business Owner Firewall Smart Technology Hard Disk Drive VoIP Managed IT Big Data Consultant Webinar Saving Money Wireless Cybersecurity Legislation Managed IT Service Two-factor Authentication Hard Drives Colocation Windows 10 Software Security HBO Adobe Hacking Data Loss Mobility BDR MSP Innovation Disaster Recovery Advertising Gadgets Identity Theft Laptop Workplace Tips PDF Retail Battery Outsourced IT Nanotechnology Smartphones Backup Files VPN Computer Search Government Customer Bring Your Own Device Public Computer Hybrid Cloud Phishing Data Storage Server Office Tips File Sharing Internet Exlporer Law Enforcement Samsung Cortana Artificial Intelligence Sales Work/Life Balance Privacy Emails Solid State Drive Public Cloud Chrome Employer-Employee Relationship Office Benefits Ransomware Two Factor Authentication Google Maps Physical Security History Smartphone Miscellaneous Collaboration Sync iOS Productivity Comparison Browser How to Safety Social Media Proactive IT App iPhone Microsoft Office Cost Management Health Downtime Meetings Computer Accessories OneNote Storage Efficiency Internet Office 365 Assessment User Tips End of Support Managed IT Services Black Market Money Augmented Reality Edge Cache Mobile Device IT Services Root Cause Analysis HaaS Device Security Books Identities Encryption Data Recovery Touchpad Virtual Reality Screen Mirroring Worker Commute Malware Conferencing Monitors Managed IT Services Hosted Solution Productivity Network Security Legal Google Docs Scalability Upgrade Training IT budget Professional Services Spam Blocking Worker Outlook intranet Vendor Management Avoiding Downtime Redundancy HIPAA Google Drive Audiobook Internet exploMicrosoft Loyalty Passwords Value eWaste Emergency Spyware Electronic Medical Records IT Solutions Automation Data USB Compliance Evernote Apps Education Computing Infrastructure Administration Content Filtering Marketing Computer Fan Users Employer Employee Relationship Upgrades Technology Windows 10 Document Management Best Practices Flexibility Data Breach CrashOverride FAQ Techology Ciminal Rootkit Thank You Windows Ink Windows 10s Wireless Technology Facebook Reputation Relocation Data storage Computer Care Licensing Internet of Things Monitor Commerce Unified Threat Management Save Money Travel Business Computing Business Management Communications Patch Management Microsoft Excel Hackers Spam Wi-Fi Cleaning Shortcut Troubleshooting Computers Dark Web SaaS Lifestyle Instant Messaging Applications Virtualization Network Email Software as a Service The Internet of Things Android Data Backup Politics Tablets Shadow IT Business Intelligence Budget Private Cloud Holiday Router Business Continuity Mobile Devices Quick Tips Mobile Charger Microsoft Save Time Small Business Operating System Automobile How To Mobile Device Management Blockchain Entertainment Maintenance Video Games Networking Word WIndows Server 2008 Scam Microsoft Word Fraud hacker WannaCry Content Data Protection Bandwidth Data Security Television Recovery Settings Hiring/Firing Password Google Bluetooth Best Practice Project Management Tech Support Specifications Vulnerability Hosted Solutions Information Technology Robot Audit Unsupported Software Transportation BYOD Remote Monitoring Hardware IT Support Credit Cards Congratulations Data Management Cloud Computing Keyboard Regulation Phone System Excel Gmail Tip of the Week Workers Alert IT solutions Gifts

Sign Up for Our Newsletter

  • Company Name *
  • First Name *
  • Last Name *