Alltech IT Solutions Blog

What You Need to Know About Payment Skimmer

What You Need to Know About Payment Skimmer

Payment cards are extremely popular to use nowadays - whether its a debit or credit card, the convenience that they offer simply cannot be denied. Unfortunately, this convenience also makes them a promising threat vector for a scammer to use, via a device called a skimmer.

We’ll go into what makes skimming a threat, and what you can do to protect yourself.

What is Payment Card Skimming, Anyway?

Credit and debit cards work by storing information to the little magnetic strip that is swiped through a credit card reader. When the card is used, the merchant’s point-of-sale system reaches out to an acquirer. An acquirer is an organization that handles authentication requests from merchants, and provides merchants with a guarantee that payment will be received.

This is how things are supposed to work - but criminals have found a way to get in the middle.

Criminals will often add their own hardware to the places where payment cards are swiped, so as the device is collecting the information stored on the magnetic strip, so is the scammer. Once the skimmer has collected the data from the card, that data can be used to fabricate fraudulent cards or make unauthorized online payments. Skimmers can be found on gas pumps, ATMs, and can even be made mobile, held in some unscrupulous person’s pocket as they scam the patrons of their place of work. Hackers can create virtual skimmers that steal information from online checkout pages - or that make it easier for them to skim credentials from physical devices, without the need to return to the scene of the crime.

Once payment card details have been collected, there are a few ways that a cybercriminal can profit from them. The most obvious way, of course, is for them to buy things with the stolen card, sticking the victim with the bill. However, this information can also be sold on the Dark Web.

What Can Be Done?

There are a few different means of protecting oneself, many of them put into place by card providers themselves. For instance, many cards now come equipped with computer chips to contain this data, a more secure option than the magnetic strip. In October 2015, it was determined that - if a store is still utilizing “swipe” methods - a store will be liable for any fraud that takes place. At the very least, this encouraged many to update their POS infrastructure (although this rule won’t apply to gas station pumps until 2020).

There are also things that you can do to keep yourself safe as well.

“Where” Is Important

Before you swipe your card, consider your environment… ATMs and kiosks located in different places will have different levels of inherent security. Remember, many skimmers need to be manually installed, which will be much more difficult for the cybercriminal to accomplish unnoticed in, say, a bank lobby than it would be in the back corner of a convenience store.

Avoid Swiping if You Can

Technology has afforded us more secure means of placing a payment than swiping cards. Besides, if you have another option, why risk it? Using a mobile app or touchless payment are both preferable options.

Keep Your Card

Unfortunately, you can’t always be sure who you can trust nowadays, so try not to let anyone walk away with your card if you can help it. Do your best to avoid situations where a merchant needs to take your card away from you - bring the card to them, or accompany them as far as you can.

Monitor Your Transactions

Many banks and credit card companies offer alerts for when transactions happen. You can get a text message immediately as soon as more than a dollar (or any amount you choose) gets put on your card. While banks often have systems in place to detect fraud, you shouldn’t just rely on them.

You’ve worked hard for your money - don’t let a scammer sneak it away from you or your business. For more information on how you can protect yourself in both your personal and professional life, subscribe to our blog, or reach out to us at 954-628-3770!

Tip of the Week: Managing Your Project Starts With...
Do Not Sacrifice Security for Mobility


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, November 13 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Laptop Environment Windows Server 2008 R2 Tech Term Search Leadership E-Commerce SaaS Voice over Internet Protocol Network Security Paper Spyware Security Cameras Managed IT Services Data Multi-Factor Security Internet Explorer User Tip Content Filtering Outlook Managing Stress Workers Worker Email Management Virtualization Payment Database Chrome Networking Gadgets Server Hiring/Firing Help Desk Vulnerabilities Password Mobility Microsoft Analytics Efficiency Mobile Office Productivity Tech Terms Solid State Drive Travel Information News Hacker Network Data loss Unified Threat Management WannaCry Tip of the week Office 365 Data Security Government HIPAA Computers Android Shortcut Server Management Scheduling Physical Security Specifications Net Neutrality Bring Your Own Device Processor Data Recovery Hard Drives Automobile Troubleshooting Word IT budget Microsoft Office 365 App Hard Drive Gmail Windows 10 Voice over IP Applications Health Office Collaboration Employer Employee Relationship Thank You Authorization Samsung Business Continuity Employees Staff Biometrics e-waste Saving Money Risk Management Patch Management Safety Online Shopping Users Hacking Digital Cybercrime Profitability Education Printers Paperless Office Spotify Technology Tips Two-factor Authentication Backup and Disaster Recovery Router Data Management Excel Mobile Device Alerts DDoS Business Technology Threat Phone System Microsoft Office Batteries eCommerce Inventory Files Wireless Vendor Budget Hybrid Cloud eWaste Scams Telephony Avoiding Downtime Current Events IT Support Error Managed IT Service Maintenance IT Services Sales Remote Monitoring Gadget Hardware Remote Monitoring and Management User Tips Going Green Webcam Congratulations Payment Cards Battery Connectivity Yahoo Encryption Hard Disk Drive Website Cleaning Sports Tip of the Week Cables Employee-Employer Relationship Value Virtual Assistant Work/Life Balance Licensing Managed IT Services Business Management Managed Services Provider Personal Information VPN Microsoft Teams Human Resources Copy Network Attached Storage Authentication Google Office Tips Instagram VoIP IaaS Dark Data Hackers Conferencing Staffing Managed IT Software Wearables instant Messaging Outsourced IT Lead Generation Cortana Windows XP Websites GDPR Printer Server Update Computer Care Social Media Windows 7 Remote Support Data Backup Retail Machine Learning Quick Tips Healthcare Productivity Save Money Project Management Remote Control Upgrade Artificial Intelligence Botnet A.I. BDR WhatsApp Browser Printer Scalability Alert HaaS Automation OneNote Cryptocurrency BYOD Benchmarks Cost Management Comparison Innovation Plug-In Amazon Bitcoin Access Facebook Synergy Spam Blocking Managed Service Provider Smart Technology Telecommute Technology Google Drive Millennials Money Employer-Employee Relationship The Internet of Things Dark Web Virus Business File Management Managed Service Internet of Things Smartphone G Suite Security Entertainment Processors Miscellaneous Remote Computing Ink Windows Internet Small Business Chrome OS Medical IT Wi-Fi Freedom of Information Edge Training iPhone Hosted Solution Vulnerability Business Intelligence Movies Autocorrect Scam Privacy Google Maps Time Management Document Management Twitter Tactics Hosted Solutions Best Practices Credit Cards Trends Apps Tech Support Holiday Law Enforcement Touchscreen Video Apple Company Culture Tablet Threats Communications Settings Downloads Unified Communications How To Smartphones Workplace Tips Marketing Access Control Storage CrashOverride Operating System Live Streaming IT Support Paste Disaster Recovery Information Technology Recycling Windows 10 Cabling Wireless Internet Streaming Media Emoji Electronic Health Records VoIp Data Breach Vendor Management RAM National Security PowerPoint User Security Cybersecurity IT Management Dongle Analysis Backup Telephone Systems Certification Emergency Cloud WiFi Passwords SSD Ransomware Politics Customer Service Proactive IT Cloud Computing Spam Knowledge Gaming Console Reporting disposal Bandwidth Big Data Business Computing Financial File Sharing Recovery Insurance Telecommuting Blockchain Mobile Security Email Phishing Telephone System Communication Mobile Device Management Printing Regulation Updates Eliminating Downtime Video Games Wireless Charging Compliance HP Antivirus Television Mobile Devices Display Taskbar Malware Computer Data Protection