Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Swipe With Care: Your ATM Might Be Controlled By A Hacker

Swipe With Care: Your ATM Might Be Controlled By A Hacker

One of the most enticing credentials that hackers desire is your credit card number, along with its expiration date and the code on the back. Hackers are also willing to go great lengths to achieve their goal of stealing these credentials, even so far as to make physical changes to automatic teller machines (ATMs) to do so. In fact, hackers will often install skimming devices on ATMs that are so subtle that they can be difficult to detect.

Take, for example, this news article from July 2017 that showcases a rather specific case of ATM skimming. The device in question simply slips over the ATM card reader in a discreet way to give the user the impression that they are using a legitimate machine. Any unsuspecting user could accidentally throw their credentials right to a hacker.

Furthermore, there have been cases of hackers implementing custom hardware into ATMs designed to harvest credentials. These devices are often installed onto ATMs so that they can wirelessly transmit credentials, to perpetrators lurking nearby. Either way, the result is the same; stolen credentials and upset victims.

Imagine waking up, checking your bank account, and noticing that you’re missing the entirety of your checking account balance. Or, even worse, finding out that your account has sunk into the red because someone in a foreign country has purchased your information and used it for their own purposes. How can you keep this from happening to you? The easiest way is to be wary of ATM skimmers in the first place. You should keep the following in mind when using an ATM.

  • Cameras surrounding the machine: If you are in an area where there are plenty of cameras, there will be less of a chance that the ATM will have been tampered with. In fact, most ATMs actually have built-in cameras, but it helps to have some extra caution to take a look around whenever you want to use one.
  • Tampering with the device: Examine the device before you use it. Are there any issues with the way it looks? Are any faceplates removed or devices plugged into it? If there are, you know that it’s not a machine that you can trust.
  • Additional “testing”: Before you insert your card into the device, try jostling the slot to see if it’s something that was artificially placed over the actual reader. Carefully inspect the machine before you insert your card. Spending a few moments to check the device before using it can save you a whole lot of pain in the long run.

What are your thoughts on ATM skimmers? Are you confident that you can identify one that has been tampered with? Leave your thoughts in the comments.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 30 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Business Google Network Security Microsoft Internet Email Malware Workplace Tips Backup Innovation User Tips Data Computer Mobile Devices Hardware IT Services Android VoIP Disaster Recovery communications Business Continuity Smartphones Communication IT Support Miscellaneous Smartphone Mobile Device Network Browser Small Business Productivity Collaboration Quick Tips Cybersecurity Business Management Users Windows Upgrade Phishing Managed IT Services Data Backup Outsourced IT Ransomware Windows 10 Office Server Save Money Data Recovery Cloud Computing Windows 10 Passwords Saving Money Holiday Chrome Virtualization Gadgets Social Media Tech Term Microsoft Office Managed IT Services Automation Managed Service Operating System Facebook Computers Artificial Intelligence Cybercrime BYOD Mobile Device Management Networking IT Support Hacking Internet of Things Wi-Fi Health Covid-19 Spam Managed Service Provider Office 365 Telephone Systems Remote Information Information Technology Alert Bandwidth Router Social Engineering Mobility BDR Recovery Employer-Employee Relationship Application Money Encryption Remote Monitoring Applications Big Data Law Enforcement App History Mobile Computing Data Breach Password Human Resources Apps Remote Computing Mobile Office How To Government Blockchain Paperless Office Office Tips Training Data Storage Patch Management Private Cloud VPN Managed IT Two-factor Authentication Mouse HaaS Data Security Google Drive Avoiding Downtime Wireless Flexibility Vulnerability Marketing Gmail Windows 7 Word WiFi Infrastructure Settings IT solutions Bring Your Own Device Voice over Internet Protocol Data Management Entertainment Work/Life Balance Servers Website Budget USB Virtual Reality Apple End of Support Data Protection Social Employee/Employer Relationship Education Physical Security RMM User Error Safety Sports HIPAA Meetings Redundancy Keyboard Risk Management Hacker Telephone System Staff Software as a Service Conferencing Machine Learning The Internet of Things Lithium-ion battery Remote Work Connectivity Scam Save Time Vendor Firewall Cleaning Managed Services Vendor Management Display Fraud SaaS Unsupported Software Processor Remote Worker Charger Battery IT Consultant Shadow IT Cryptocurrency Hard Drive Compliance Network Congestion eWaste Legal OneNote Computer Care Humor Current Events Internet Exlporer Telephony Comparison Computing Samsung CES PDF Wearable Technology Value Retail Hard Drives Instant Messaging Proactive IT Spam Blocking Business Technology Electronic Medical Records Content Management Robot Excel Access Control Digital Signage Best Practice Biometrics YouTube Virtual Assistant Hiring/Firing Virtual Desktop Black Market Authentication Virus Procurement DDoS Workplace Strategy Net Neutrality Unified Threat Management Document Management Wireless Technology Computer Accessories Help Desk Update SharePoint Solid State Drive How to Downtime Business Intelligence Printing Audit Worker Google Docs Identity Theft Customer Service Data storage IT Management Managed Services Provider Automobile Environment Botnet Printer Database Bluetooth Fax Server IT Plan Computing Infrastructure Going Green Augmented Reality Remote Workers Twitter Manufacturing Reputation Email Best Practices Tablet Streaming Media Search Engine IT Assessment IBM Tech Support NIST Smart Technology Business Mangement Content Domains Flash Trending Techology Laptop Computer Tips Managed IT Service Smart Tech Security Cameras Addiction Biometric Security Amazon IaaS Maintenance Customers Virtual CIO Software Tips OneDrive Supercomputer Bloatware Peripheral Emails Recycling Audiobook Sync Touchpad Digital Security Cameras Wiring Using Data Practices Cache 5G Amazon Web Services Tablets Copiers Entrepreneur Quick Tip Netflix Safe Mode Two Factor Authentication Criminal Politics Advertising Ergonomics Root Cause Analysis GDPR Hosted Computing Smartwatch Wireless Internet OLED Music Online Shopping Shortcut HBO Notifications Development Knowledge Skype Consultant Cost Management PCI DSS File Sharing Virtual Machine Specifications Social Networking 2FA Data loss Analytics Camera Fiber Optics Inventory Employee Leadership Wire Cabling Troubleshooting Evernote Relocation Outlook Messaging Start Menu Best Available Policy Hypervisor Travel Millennials Running Cable Video Games WIndows 7 Dark mode Screen Mirroring Printers Trend Micro Loyalty Smart Office Default App Books Wireless Charging Worker Commute Frequently Asked Questions Memory SMS Mobile Procedure Windows 10s Saving Time Experience Workforce Scalability dark theme Cast Virtual Private Network Shopping Google Search webinar IT Infrastructure Emergency Cables Business Owner Tip of the week AI Professional Services NarrowBand FinTech Public Cloud Employer Employee Relationship Bing Telecommuting Search User PowerPoint Science Project Management Social Network Assessment Windows Media Player Nanotechnology Investment Cortana iPhone Windows Server 2008 Tools Employees Employee/Employer Relationships Digital Signature ISP Distributed Denial of Service Managing Stress Customer Relationship Management Windows 365 Warranty Television Video Conferencing HVAC ROI Google Apps Files Analyitcs Programming Chromecast Sales Cameras Bitcoin Analysis Shortcuts Cryptomining Point of Sale Administrator Personal Public Computer Devices Supply Chain Management Enterprise Content Management Transportation Colocation Regulations Uninterrupted Power Supply Antivirus Monitoring Computer Fan MSP Batteries Rootkit Accountants Credit Cards Monitor Windows 8.1 Windows 8 Microchip Digitize Thought Leadership Workers Password Management Windows Server 2008 R2 Benefits Password Manager IT service Customer relationships FENG Printer Server Multi-Factor Security

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code