Knowledge is power
Skimming: What You Need to Know
Skimming is a type of theft where criminals use hidden devices to steal payment card information when you swipe or insert your card into a machine, like an ATM or a gas pump. These devices capture data from the card's magnetic strip, allowing criminals to clone the card and make unauthorised purchases. Skimming can happen at any card reader that isn’t closely monitored, making it a widespread and silent threat.
Whats the thinking
How Skimming Works
Skimming devices are typically small and discreet, often attached to or inserted into card readers. When you insert or swipe your card, the skimmer captures data from the card’s magnetic strip. In more advanced cases, criminals use a small hidden camera or a fake keypad overlay to capture your PIN as well.
Common skimming locations include:
- ATMs: Skimmers are attached to the card slot, with a hidden camera nearby.
- Gas Pumps: Skimmers are installed inside or around the card reader.
- POS Terminals: Fraudulent POS terminals in stores capture card data as you pay.
- Contactless Readers: Attackers use wireless devices to skim data from contactless cards nearby.
With the data collected, criminals can create cloned cards or use the information to make online purchases.
Whats the thinking
Why Do People Fall Victim to Skimming?
Skimming works because it’s often invisible to the untrained eye. Criminals design skimming devices to blend seamlessly with card readers, making it hard for people to spot them. Many people are also unaware of the risk and might not inspect an ATM or payment terminal before using it. Criminals take advantage of this by placing skimmers in high-traffic, unattended locations like gas stations and outdoor ATMs.
The lack of awareness and the sophistication of skimming devices make it easy for unsuspecting people to fall victim to these attacks.
Whats the thinking
The Mindset Behind Skimming
The primary goal of skimming is financial gain. Skimming devices are designed to steal card data without direct interaction with the victim, allowing criminals to target many people in a short time. Skimmers are placed in high-traffic, often unsupervised locations, enabling attackers to harvest card data passively and discreetly.
Skimming is less about directly manipulating the victim and more about covertly capturing their information, making it a low-risk, high-reward tactic for criminals.
What to Look For
Common Phishing Warning Signs
To avoid falling victim to phishing, here are some common warning signs
Show me
Common Phishing Examples
Here are a few examples to show how phishing scams work in the real world
