Spring Cleaning Your Office? Know What to Do with E-Waste
Keep Your Identity Safe When Filing Taxes This Year
Why use Penn+Box when Storing Data in the Cloud
Mobile Device Security - 3 Recommendations for Cloud Users (Hint: That's You!)
Be Aware of QR Code Risks
Itís Data Privacy Month: Update Your Facebook Privacy Settings and More
How Are You Celebrating Data Privacy Month?
Stay Secure while Working on Public Wi-Fi Networks
Protecting Your Finances During This Year's Holiday Shopping Season
Cloud and You
Security and Privacy Online Training & Tools
October: Free Secure Disposal of Paper and Electronics at Employee Resource Fair; NCSAM
Student Privacy - What Do I Need To Know? A FERPA Reminder
Top 10 Tips for Securing Your Smartphone or Tablet
Working Off Campus? Some Tips to Consider
Tuesday, March 15, 2011 - Almanac Vol. 57, No. 25
These Readers Are Not Fortune Tellers, They Are Fortune Stealers
We've dealt in previous tips with the ongoing problem of "skimmers" and other devices attached to automated teller machines (ATMs). These devices collect not only the information on the magnetic stripes of cards inserted into the machine, but also the PIN numbers entered by the user. The technology has evolved to the point where the thieves often retrieve the stolen data remotely via wireless network, or even text messages sent to their cell phones. A full discussion is beyond the space available here, but an excellent recap by renowned security expert Brian Krebs can be found at krebsonsecurity.com/all-about-skimmers/.
There are a couple of recent developments that are worth highlighting:
Be vigilant, but the key piece of advice in coping with "skimming" remains always check your account statements as soon as they arrive, particularly those for debit cards. There are different liability standards imposed for debit cards than for credit cards, and if you delay reporting theft from a debit account, you risk losing the entire amount stolen.
- While it's still a good general practice to use ATM machines located at bank branches, there have been instances where the machines are located in small rooms or vestibules where - especially outside of normal business hours - access is granted via a card reader on the door; the reader requires the same card as the ATM, and "skimming" devices have been found on the door devices instead of the ATMs. In the case of a bank branch in Sherman Oaks, California, this was found to have occurred nine times in 2009 alone. So keep in mind that any device that requires reading your card carries a "skimming" risk.
- Also, surreptitious card readers are being found with increasing frequency on gas pumps, and these are even harder to spot due to the fact that the thieves have often managed to open the pump and "hard-wire" the devices. Then, as happened in the Denver area in 2010, the thieves sometimes try to "pump up" their take by calling people at random, posing as businesses and offering gift cards for filling up at the stations they've infiltrated.