Blog
home
  • Register

Data Net Blog

What You Need to Know About Payment Skimmer

What You Need to Know About Payment Skimmer

Payment cards are extremely popular to use nowadays - whether its a debit or credit card, the convenience that they offer simply cannot be denied. Unfortunately, this convenience also makes them a promising threat vector for a scammer to use, via a device called a skimmer.

We’ll go into what makes skimming a threat, and what you can do to protect yourself.

What is Payment Card Skimming, Anyway?

Credit and debit cards work by storing information to the little magnetic strip that is swiped through a credit card reader. When the card is used, the merchant’s point-of-sale system reaches out to an acquirer. An acquirer is an organization that handles authentication requests from merchants, and provides merchants with a guarantee that payment will be received.

This is how things are supposed to work - but criminals have found a way to get in the middle.

Criminals will often add their own hardware to the places where payment cards are swiped, so as the device is collecting the information stored on the magnetic strip, so is the scammer. Once the skimmer has collected the data from the card, that data can be used to fabricate fraudulent cards or make unauthorized online payments. Skimmers can be found on gas pumps, ATMs, and can even be made mobile, held in some unscrupulous person’s pocket as they scam the patrons of their place of work. Hackers can create virtual skimmers that steal information from online checkout pages - or that make it easier for them to skim credentials from physical devices, without the need to return to the scene of the crime.

Once payment card details have been collected, there are a few ways that a cybercriminal can profit from them. The most obvious way, of course, is for them to buy things with the stolen card, sticking the victim with the bill. However, this information can also be sold on the Dark Web.

What Can Be Done?

There are a few different means of protecting oneself, many of them put into place by card providers themselves. For instance, many cards now come equipped with computer chips to contain this data, a more secure option than the magnetic strip. In October 2015, it was determined that - if a store is still utilizing “swipe” methods - a store will be liable for any fraud that takes place. At the very least, this encouraged many to update their POS infrastructure (although this rule won’t apply to gas station pumps until 2020).

There are also things that you can do to keep yourself safe as well.

“Where” Is Important

Before you swipe your card, consider your environment… ATMs and kiosks located in different places will have different levels of inherent security. Remember, many skimmers need to be manually installed, which will be much more difficult for the cybercriminal to accomplish unnoticed in, say, a bank lobby than it would be in the back corner of a convenience store.

Avoid Swiping if You Can

Technology has afforded us more secure means of placing a payment than swiping cards. Besides, if you have another option, why risk it? Using a mobile app or touchless payment are both preferable options.

Keep Your Card

Unfortunately, you can’t always be sure who you can trust nowadays, so try not to let anyone walk away with your card if you can help it. Do your best to avoid situations where a merchant needs to take your card away from you - bring the card to them, or accompany them as far as you can.

Monitor Your Transactions

Many banks and credit card companies offer alerts for when transactions happen. You can get a text message immediately as soon as more than a dollar (or any amount you choose) gets put on your card. While banks often have systems in place to detect fraud, you shouldn’t just rely on them.

You’ve worked hard for your money - don’t let a scammer sneak it away from you or your business. For more information on how you can protect yourself in both your personal and professional life, subscribe to our blog, or reach out to us at (760) 466-1200!

Tip of the Week: Managing Your Project Starts With...
Do Not Sacrifice Security for Mobility
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, October 23, 2019

Captcha Image

Tag Cloud

Tip of the Week Security Best Practices Technology Network Security Business Computing Productivity Data Malware Hackers Privacy User Tips Efficiency Google Microsoft Communication Tech Term Smartphones Email Hardware Computer Cybersecurity Innovation Communications Internet Mobile Device Software IT Support Cloud Workplace Tips Small Business Ransomware VoIp Android Users Windows 10 Managed IT Services Business Management Business Browser Miscellaneous Collaboration Network Mobile Devices IT Services Passwords Social Media Smartphone Applications Hosted Solutions Cloud Computing Information Outsourced IT Internet of Things Wi-Fi Windows Apps Employer-Employee Relationship Upgrade Data Backup Gmail Wireless Bandwidth Chrome Microsoft Office Holiday Backup Managed IT services Blockchain Gadgets Data recovery Managed Service Networking Patch Management Saving Money Phishing Save Money Marketing Laptop Access Control VPN Value Business Intelligence Word Virtualization Company Culture Tech Terms Cost Management Computers Facebook Voice over Internet Protocol Automation Virus Payment Cards Office 365 How To Data Protection Compliance Settings Artificial Intelligence Telephony Physical Security Healthcare Going Green G Suite Password Net Neutrality Processor Excel Data Security Paperless Office Remote Monitoring and Management RAM Scam Data Breach Mobility Cortana Batteries Router Medical IT BDR Government Remote Computing Employee-Employer Relationship Wireless Charging Data Management Quick Tips Managed IT Service Connectivity Office Virtual Assistant Security Cameras Risk Management Law Enforcement Telecommuting Paper Safety Remote Monitoring Electronic Health Records Education User Tip Spyware Data loss News Time Management Insurance Sales Online Shopping Movies Touchscreen Licensing Business Continuity Eliminating Downtime Database Payment Big Data GDPR Technology Tips Customer Service Content Filtering Wearables Ink Edge Retail Health Server Managing Stress Network Attached Storage Live Streaming Environment Maintenance HP Plug-In Spam Telephone System Chrome OS File Management Tablet IT budget Microsoft Office 365 Tech Support Twitter Updates BYOD Cybercrime instant Messaging Threats User Security Streaming Media Storage OneNote WannaCry Workers PowerPoint Dongle Remote Support Employees Comparison Troubleshooting e-waste Tip of the week Internet Explorer Document Management Proactive IT Antivirus Cleaning Current Events Unified Communications Authentication Alert Inventory Vulnerability Certification HIPAA Machine Learning Wireless Internet Tactics Vulnerabilities Scams Business Technology Voice over IP Downloads Dark Web Backup and Disaster Recovery Windows Server 2008 R2 disposal Recycling File Sharing Millennials Sports Reporting Solid State Drive Specifications Bring Your Own Device Update Threat Staff Human Resources Knowledge Battery IT Management Authorization Mobile Security Display Hard Drive Amazon Cryptocurrency Project Management Trends Error Hard Drives Apple Taskbar Hybrid Cloud Congratulations Server Management Outlook Personal Information Analytics Hard Disk Drive Conferencing Lead Generation Benchmarks Printing Digital Websites Botnet Microsoft Teams Travel Operating System Training Processors Telecommute Windows 7 Search eCommerce A.I. SSD iPhone Help Desk National Security Cables Profitability WhatsApp E-Commerce Bitcoin SaaS Website Video Disaster Recovery Financial Printers WiFi Regulation Thank You Analysis

Latest News & Events

Please join us in congratulating Bill Vann on his promotion to Customer Success Manager....

Contact Us

Learn more about what Data Net can do for your business.

Call Us Today
Call us today
(760) 466-1200

5795 Kearny Villa Road
San Diego, California 92123