OK, this is the first time I've seen a Skimming attack on POS registers. But the proof is in the pudding as they say. So far, two cases in which SELF SERVE POS REGISTERS serve as points by which criminals capture data illegally.
http://www.cuinfosecurity.com/articles.php?art_id=4280
In this particular case, there appears to be no account data compromised. But, it reminds us that at ANY Point of Sale location can serve as a Skimming risk...
Interesting...
Tuesday, November 29, 2011
$1 Million ATM Fraud Scam Busted
Zoweee! Some key aspects in this article.
http://www.cuinfosecurity.com/articles.php?art_id=4274
First, ONE DAY of skimming yielded about 350K in losses. A single Sunday the criminals used a skimmer and pinhole camera to collect just 350 acct and pin numbers. Then they pulled about 1000 from each account.
Second, in many of these cases, it's the CUSTOMERS bringing attention to the cases, not the banks or law enforcement folks who solve the crime. Interesting that we are still relying on ourselves to solve this type of crime. Be very observant when you use your ATM machines.
Finally, it seems, according to the article that there is an explosion of ATM Skimming crimes with no real end in site. The crimes are small enough that legislation to combat the problem wont be reviewed for a long time. This means the problems will persist.
http://www.cuinfosecurity.com/articles.php?art_id=4274
First, ONE DAY of skimming yielded about 350K in losses. A single Sunday the criminals used a skimmer and pinhole camera to collect just 350 acct and pin numbers. Then they pulled about 1000 from each account.
Second, in many of these cases, it's the CUSTOMERS bringing attention to the cases, not the banks or law enforcement folks who solve the crime. Interesting that we are still relying on ourselves to solve this type of crime. Be very observant when you use your ATM machines.
Finally, it seems, according to the article that there is an explosion of ATM Skimming crimes with no real end in site. The crimes are small enough that legislation to combat the problem wont be reviewed for a long time. This means the problems will persist.
Monday, November 14, 2011
News 9 in Colorado on Skimming Devices in Area
Interesting video article on the use of skimming devices recently in Colorado.
http://www.9news.com/video/default.aspx?bctid=1265391195001&odyssey=modtvideoendslate
I think the hidden story here is how most manufacturers attempt to correct for the problem. Very costly to install, replace the ATM, replace parts of the ATM, or train the consumer. Hmmm..
http://www.9news.com/video/default.aspx?bctid=1265391195001&odyssey=modtvideoendslate
I think the hidden story here is how most manufacturers attempt to correct for the problem. Very costly to install, replace the ATM, replace parts of the ATM, or train the consumer. Hmmm..
Monday, November 7, 2011
Skimming Scam STOPPED by Bank and Merchants
Good article on how certain merchants in Orlando FL helped stop a skimming scam from continuing over time. The most intriguing statement I read from this is
"It's almost like they can't stop themselves from doing it..."
The statement is referring to the fact that US-based Credit and Debit machines still use older magnetic stripe technology, which is outdated and has inherent security risks.
See the full article here:
http://www.cuinfosecurity.com/articles.php?art_id=4218&rf=2011-11-04-ec&elq=6ee1ce687bca4b50ba1517aa85f0222a&elqCampaignId=765
"It's almost like they can't stop themselves from doing it..."
The statement is referring to the fact that US-based Credit and Debit machines still use older magnetic stripe technology, which is outdated and has inherent security risks.
See the full article here:
http://www.cuinfosecurity.com/articles.php?art_id=4218&rf=2011-11-04-ec&elq=6ee1ce687bca4b50ba1517aa85f0222a&elqCampaignId=765
Tuesday, November 1, 2011
21st Century Store Manager - Reseach Preview
Great Article on Retail.
Key Points:
http://www.retailsystemsresearch.com/_document/summary/1363
Enjoy...
Key Points:
- Customers are incredibly empowered with Mobile Technology, causing weakness to brick and mortar stores
- Manager and Employees in the store are most important in overcoming weakness
- Four main ways ALL retailers can implement changes for benefit:
- Give Managers more access to information on goods and services they are selling
- Give Managers access to operational metrics on whats happening "in the store" REAL TIME
- Present this information WHERE the Manager IS and...
- The Manage needs to be out on the floor of the store
http://www.retailsystemsresearch.com/_document/summary/1363
Enjoy...
Monday, October 24, 2011
Radio Shack Back to its Roots?
Wow, now this would be a novel idea! I can recall so many times over the last two years trying to just go out to the local Rat Shack to try to find something as common as an Ethernet crossover cable, and being met with that tragic phrase "No, we don't carry that anymore..." and even worse for Radio Shack "You might try Best Buy down the road...".
It sounds like Radio Shack may be making some intersting changes in the near future...
http://adage.com/article/special-report-ana-annual-meeting/radioshack-s-journey-bring-back-a-forgotten-customer/230602/
It sounds like Radio Shack may be making some intersting changes in the near future...
http://adage.com/article/special-report-ana-annual-meeting/radioshack-s-journey-bring-back-a-forgotten-customer/230602/
Friday, October 21, 2011
Smishing Scam Targets Wells Fargo
OK,
So a slightly different take on a familiar PHISHING attack. In this type of scam, a cell phone user receives a TEXT (seemingly from the bank) saying there has been a breach in security and they need to call or respond with specific information (account #, personal info, last four digits, etc.). Then the criminal takes that information and drains an account...
See full story here...
http://www.cuinfosecurity.com/articles.php?art_id=4172
So a slightly different take on a familiar PHISHING attack. In this type of scam, a cell phone user receives a TEXT (seemingly from the bank) saying there has been a breach in security and they need to call or respond with specific information (account #, personal info, last four digits, etc.). Then the criminal takes that information and drains an account...
See full story here...
http://www.cuinfosecurity.com/articles.php?art_id=4172
Subscribe to:
Posts (Atom)