Yearly Archives: 2014

More on Wiretapping ATM Skimmers

December 9, 2014

Last month, this blog featured a story about an innovation in ATM skimming known as wiretapping, which I said involves a “tiny” hole cut in the ATM’s front through which thieves insert devices capable of eavesdropping on and recording the ATM user’s card data. Turns out, the holes the crooks make to insert their gear tend to be anything but tiny.

Toward a Breach Canary for Data Brokers

December 8, 2014

When a retailer’s credit card systems get breached by hackers, banks usually can tell which merchant got hacked soon after those card accounts become available for purchase at underground cybercrime shops. But when commercial data brokers get hacked or are tricked into giving consumers’ data to identity thieves, there is no easy way to tell who leaked the information when it ends up for sale in the black market. In this post, we’ll examine one idea to hold consumer data brokers more accountable.

Treasury Dept: Tor a Big Source of Bank Fraud

December 5, 2014

A new report from the U.S. Treasury Department found that a majority of bank account takeovers by cyberthieves over the past decade might have been thwarted had affected institutions known to look for and block transactions coming through Tor, a global communications network that helps users maintain anonymity by obfuscating their true location online.

Be Wary of ‘Order Confirmation’ Emails

December 3, 2014

If you receive an email this holiday season asking you to “confirm” an online e-commerce order or package shipment, please resist the urge to click the included link or attachment: Malware purveyors and spammers are blasting these missives by the millions each day in a bid to trick people into giving up control over their computers and identities.

Skimmer Innovation: ‘Wiretapping’ ATMs

November 26, 2014

Banks in Europe are warning about the emergence of a rare form of ATM skimmer involving a wire-like device that is inserted through a tiny hole cut in the cash machine’s front. The hole is covered up by a fake decal, and the thieves somehow attach the device to the place inside the ATM where the customer’s card is inserted.