Blog
home
  • Register

Data Net Blog

What You Need to Know About Payment Skimmer

What You Need to Know About Payment Skimmer

Payment cards are extremely popular to use nowadays - whether its a debit or credit card, the convenience that they offer simply cannot be denied. Unfortunately, this convenience also makes them a promising threat vector for a scammer to use, via a device called a skimmer.

We’ll go into what makes skimming a threat, and what you can do to protect yourself.

What is Payment Card Skimming, Anyway?

Credit and debit cards work by storing information to the little magnetic strip that is swiped through a credit card reader. When the card is used, the merchant’s point-of-sale system reaches out to an acquirer. An acquirer is an organization that handles authentication requests from merchants, and provides merchants with a guarantee that payment will be received.

This is how things are supposed to work - but criminals have found a way to get in the middle.

Criminals will often add their own hardware to the places where payment cards are swiped, so as the device is collecting the information stored on the magnetic strip, so is the scammer. Once the skimmer has collected the data from the card, that data can be used to fabricate fraudulent cards or make unauthorized online payments. Skimmers can be found on gas pumps, ATMs, and can even be made mobile, held in some unscrupulous person’s pocket as they scam the patrons of their place of work. Hackers can create virtual skimmers that steal information from online checkout pages - or that make it easier for them to skim credentials from physical devices, without the need to return to the scene of the crime.

Once payment card details have been collected, there are a few ways that a cybercriminal can profit from them. The most obvious way, of course, is for them to buy things with the stolen card, sticking the victim with the bill. However, this information can also be sold on the Dark Web.

What Can Be Done?

There are a few different means of protecting oneself, many of them put into place by card providers themselves. For instance, many cards now come equipped with computer chips to contain this data, a more secure option than the magnetic strip. In October 2015, it was determined that - if a store is still utilizing “swipe” methods - a store will be liable for any fraud that takes place. At the very least, this encouraged many to update their POS infrastructure (although this rule won’t apply to gas station pumps until 2020).

There are also things that you can do to keep yourself safe as well.

“Where” Is Important

Before you swipe your card, consider your environment… ATMs and kiosks located in different places will have different levels of inherent security. Remember, many skimmers need to be manually installed, which will be much more difficult for the cybercriminal to accomplish unnoticed in, say, a bank lobby than it would be in the back corner of a convenience store.

Avoid Swiping if You Can

Technology has afforded us more secure means of placing a payment than swiping cards. Besides, if you have another option, why risk it? Using a mobile app or touchless payment are both preferable options.

Keep Your Card

Unfortunately, you can’t always be sure who you can trust nowadays, so try not to let anyone walk away with your card if you can help it. Do your best to avoid situations where a merchant needs to take your card away from you - bring the card to them, or accompany them as far as you can.

Monitor Your Transactions

Many banks and credit card companies offer alerts for when transactions happen. You can get a text message immediately as soon as more than a dollar (or any amount you choose) gets put on your card. While banks often have systems in place to detect fraud, you shouldn’t just rely on them.

You’ve worked hard for your money - don’t let a scammer sneak it away from you or your business. For more information on how you can protect yourself in both your personal and professional life, subscribe to our blog, or reach out to us at (760) 466-1200!

Tip of the Week: Managing Your Project Starts With...
Do Not Sacrifice Security for Mobility
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, January 19, 2020

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Network Security Productivity Data Privacy Malware Hackers Efficiency Smartphones User Tips Email Microsoft Innovation Google Managed IT Services IT Support Communication Tech Term Software Communications Hardware Cybersecurity Mobile Device VoIp Computer Internet Windows 10 Small Business Mobile Devices Users Business Management Cloud Ransomware Workplace Tips Android Outsourced IT Miscellaneous Cloud Computing IT Services Business Social Media Collaboration Browser Data Backup Passwords Hosted Solutions Network Information Wi-Fi Facebook Internet of Things Upgrade Applications Bandwidth Apps Backup Holiday Data recovery Smartphone Managed IT services Patch Management Windows Networking Employer-Employee Relationship Chrome Gmail Managed Service Microsoft Office Wireless VPN Gadgets Blockchain Managed IT Service Saving Money Phishing Save Money Access Control Marketing Laptop Apple Compliance Value BDR Word Router Business Intelligence How To Tech Terms Cost Management Virus Retail Office Virtual Assistant Computers Bring Your Own Device Business Continuity Automation Telephone System Remote Monitoring and Management Virtualization RAM Payment Cards Physical Security Office 365 Medical IT Social Network Artificial Intelligence Quick Tips Data Protection Settings Excel Password Telephony Healthcare Going Green Connectivity Processor Net Neutrality Scam Data Breach Company Culture Voice over Internet Protocol Business Technology Data Security Paperless Office Mobility iPhone Cortana Batteries Data Management Remote Monitoring Employee-Employer Relationship G Suite Wireless Charging Windows 7 Government Remote Computing Co-Managed IT Wireless Internet eCommerce E-Commerce Bitcoin Safety Downloads Dark Web Processors Video Mobile Device Management Security Cameras Risk Management Data loss Sports Reporting Electronic Health Records Vendor Live Streaming Update Database Threat Time Management Insurance Big Data Technology Tips Tech Support Authorization Law Enforcement Telecommuting Humor Amazon Sales Online Shopping Payment Edge Trends Error User Tip Spyware Customer Service Holidays Network Attached Storage Environment Hybrid Cloud Outlook Wearables HP Spam Remote Support Content Filtering Health IT budget Twitter Updates Cybercrime Cleaning Printing Server Chrome OS File Management Alert Vulnerability Microsoft Teams Memes Tablet instant Messaging Threats Dongle A.I. OneNote e-waste Cables Profitability User Security Document Management Antivirus SaaS WannaCry Employees Distribution Inventory Virtual Private Network Certification Machine Learning Tactics Paper Comparison Current Events Backup and Disaster Recovery Workers disposal IT Vulnerabilities Scams Movies Touchscreen Tip of the week Windows Server 2008 R2 Eliminating Downtime Voice over IP Recycling Staff GDPR HIPAA Solid State Drive Fleet Management IT Management Mobile Security Congratulations Customer Relationship Management Display Botnet Ink Specifications Human Resources Mobile Office Hard Drives Travel Managing Stress File Sharing Millennials Server Management Hosted Desktop Maintenance Plug-In Knowledge Battery Cryptocurrency Project Management Analytics Microsoft Office 365 Taskbar BYOD Personal Information Digital Websites Website Streaming Media Storage Hard Drive Hard Disk Drive Multi-Factor Authentication Operating System WhatsApp Managed Service Provider Training Benchmarks Telecommute PowerPoint Conferencing Lead Generation Managed Services Provider SSD Education Troubleshooting News Internet Explorer Proactive IT Search Licensing Unified Communications Authentication Help Desk National Security WiFi Financial Analysis Thank You Disaster Recovery Printers Regulation

Latest News & Events

Please join us in congratulating Bill Vann on his promotion to Customer Success Manager....

Contact Us

Learn more about what Data Net can do for your business.

Call Us Today
Call us today
(760) 466-1200

5795 Kearny Villa Road
San Diego, California 92123