Tuesday, November 29, 2011

Fraud Scheme Hits Grocer

OK, this is the first time I've seen a Skimming attack on POS registers.  But the proof is in the pudding as they say.  So far, two cases in which SELF SERVE POS REGISTERS serve as points by which criminals capture data illegally. 

http://www.cuinfosecurity.com/articles.php?art_id=4280

In this particular case, there appears to be no account data compromised.  But, it reminds us that at ANY Point of Sale location can serve as a Skimming risk...

Interesting...

$1 Million ATM Fraud Scam Busted

Zoweee!  Some key aspects in this article. 

http://www.cuinfosecurity.com/articles.php?art_id=4274

First, ONE DAY of skimming yielded about 350K in losses.  A single Sunday the criminals used a skimmer and pinhole camera to collect just 350 acct and pin numbers.  Then they pulled about 1000 from each account.

Second, in many of these cases, it's the CUSTOMERS bringing attention to the cases, not the banks or law enforcement folks who solve the crime.  Interesting that we are still relying on ourselves to solve this type of crime.  Be very observant when you use your ATM machines.

Finally, it seems, according to the article that there is an explosion of ATM Skimming crimes with no real end in site.  The crimes are small enough that legislation to combat the problem wont be reviewed for a long time.  This means the problems will persist.

Monday, November 14, 2011

News 9 in Colorado on Skimming Devices in Area

Interesting video article on the use of skimming devices recently in Colorado. 

http://www.9news.com/video/default.aspx?bctid=1265391195001&odyssey=modtvideoendslate
 
I think the hidden story here is how most manufacturers attempt to correct for the problem.  Very costly to install, replace the ATM, replace parts of the ATM, or train the consumer.  Hmmm..
 

Monday, November 7, 2011

Skimming Scam STOPPED by Bank and Merchants

Good article on how certain merchants in Orlando FL helped stop a skimming scam from continuing over time.  The most intriguing statement I read from this is

"It's almost like they can't stop themselves from doing it..."

The statement is referring to the fact that US-based Credit and Debit machines still use older magnetic stripe technology, which is outdated and has inherent security risks.

See the full article here:

http://www.cuinfosecurity.com/articles.php?art_id=4218&rf=2011-11-04-ec&elq=6ee1ce687bca4b50ba1517aa85f0222a&elqCampaignId=765

Tuesday, November 1, 2011

21st Century Store Manager - Reseach Preview

Great Article on Retail.

Key Points:
  • Customers are incredibly empowered with Mobile Technology, causing weakness to brick and mortar stores
  • Manager and Employees in the store are most important in overcoming weakness
  • Four main ways ALL retailers can implement changes for benefit:
    • Give Managers more access to information on goods and services they are selling
    • Give Managers access to operational metrics on whats happening "in the store" REAL TIME
    • Present this information WHERE the Manager IS and...
    • The Manage needs to be out on the floor of the store
Good information in this article...

http://www.retailsystemsresearch.com/_document/summary/1363

Enjoy...

Monday, October 24, 2011

Radio Shack Back to its Roots?

Wow, now this would be a novel idea!  I can recall so many times over the last two years trying to just go out to the local Rat Shack to try to find something as common as an Ethernet crossover cable, and being met with that tragic phrase "No, we don't carry that anymore..."  and even worse for Radio Shack "You might try Best Buy down the road...". 

It sounds like Radio Shack may be making some intersting changes in the near future...

http://adage.com/article/special-report-ana-annual-meeting/radioshack-s-journey-bring-back-a-forgotten-customer/230602/

Friday, October 21, 2011

Smishing Scam Targets Wells Fargo

OK,

So a slightly different take on a familiar PHISHING attack.  In this type of scam, a cell phone user receives a TEXT (seemingly from the bank) saying there has been a breach in security and they need to call or respond with specific information (account #, personal info, last four digits, etc.).  Then the criminal takes that information and drains an account...

See full story here...

http://www.cuinfosecurity.com/articles.php?art_id=4172

Strategies to Optimize Every Customer Interaction