Computerworld Hong Kong - It's hard to remember life without ATMs. In Hong Kong, we can transfer funds, pay our utility bills and even settle tax demand-notes using an ATM. And they even dispense cash.
We're so used to these handy machines that we may not always view them as security risks. But we should. As security gurus like Bruce Schneier point out, we make security decisions all the time--some conscious, some subconscious.
It's time to put your ATM security strategy into your conscious personal security perimeter, if it's not there already. You may know that ATMs can be fitted with "skimmers": snap-on devices that include card readers and pinhole cameras. The crooks want to steal your account number and watch you type in your PIN, then clone your card for nefarious purposes.
According to a recent story in the South China Morning Post, illegal skimming equipment is believed to have been installed on at least 10 Hong Kong ATMs since September. From October to December 2012, 18 people reported losing money--14 in December alone.
Mainland authorities have been contacted because illegal withdrawals using fake cards and the stolen data were made across the border, according to the SCMP.
ATM cards are being replaced with ones bearing an embedded microchip for greater security by Hong Kong banks, and this process should be completed in 2015. But as ever, your awareness and alertness are the best weapons against thieves using technology.
ATM-skimmers are uncommon, but should you suspect an ATM has been tampered with, please report it to the HKP on their Commercial and Technology Crime Hotline hotline: 2860 5012.
Secure locations for ATMs
ATMs located on public streets are accessible to anyone at any time, making them prime targets for a skimmer. One security-measure worth checking: streetside ATMs attached to a bank sometimes have a security camera (look for the half-dome on the underside).
Another factor: the bad guys like to keep visual contact with the ATM they've illegally modified. An ATM inside a bank-lobby, or shopping mall, or other facility that is locked during non-business hours, is a better choice than a streetside ATM.
Be aware of your ATM's surroundings. You're making a transaction involving valuable personal data and cash. Now is not the time to check Facebook on your mobile phone.
Skimmers use pinhole-cameras which can record your PIN (Personal Identification Number) when you type it on the keypad.
Hong Kong ATMs have useful shields around the keypad, but this is important: always cover your typing hand when entering your PIN. You can use your free hand, purse, or wallet to cover the keypad.
Follow the instructions on the ATM: cover your typing hand when you enter your PIN. Every time. This simple practice just might save you from a substantial loss of funds.
Be alert when you use an ATM. Don't let anyone distract you--complete your transaction, be sure you've tucked away your card (and cash) safely, and leave.
More information on ATM-skimmers is available from the website of Charles Krebs: a US-based security researcher who documents these criminal devices. Krebs compiles his ATM-skimmer stories here:
Basic security practices are important when you use any ATM. Refuse to be a victim. Remain alert, cover the keypad when entering your PIN, and urge others to do the same.
- 18 Hot IT Certifications for 2014
- CIOs Opting for IT Contractors Over Hiring Full-Time Staff
- 12 Best Free iOS 7 Holiday Shopping Apps
- For CMOs Big Data Can Lead to Big Profits
- Slideshow: 5 ways to lock down your mobile device
- Slideshow: 10 mistakes companies make after a data breach
- How to rob a bank: A social engineering walk through
- Which smartphone is the most secure?
China says to Chiang Kai-shek all Bitcoins at the door.
China marches long and hard over internal financial institutions, proclaiming that Bitcoins "should not and cannot be used as a currency". The news sent Bitcoin exchanges into a dive like cormorants in the deep China Sea. But all is not lost -- or is it? Bitcoins have been bubbling back to the surface, or has China's stance drained all enthusiasm? In IT Blogwatch, fearless leaders and bloggers quote pearls of wisdom from the little red book of Bitcoin. Not to mention: Financial advice from Whiz and Ice...
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Make or Break: New Auto Products Must Go To Market On Time
- This Webcast quantifies the value of time to market for the auto industry and highlights how Primavera Enterprise Portfolio Management can help organizations.
- Stock Shock: The effect of project and portfolio management on share price
- In this independent report, you'll see the intrinsic connection between long-term capital investment and short term market performance -- and how this can...
- Hedge Your Bets
- This report explains how visibility and increased governance is key to reducing risk.
- In the Firing Line
- CEOs Are Increasingly Being Held Accountable; How susceptible is the CEO's reputation to poor performance across the project portfolio?
- The CISO's Guide To Virtualization Security
- This guide describes the security challenges within virtualized environments and shows how to apply the concepts of Forrester's Zero Trust Model of information... All Financial IT White Papers
- Live Webcast Research Report: The Big Data Opportunity for HR and Finance If CEOs, CFOs, CIOs, and CHROs want to drive their businesses forward, they will need to quickly recognize the enormous value of big...
- Live Webcast The Freedom to Run Your Business Your Way Vendors are challenged to create flexible systems that customers can tailor to particular business strategies and industry needs. But the flexibility should not...
- Live Webcast The Business Value of Human Capital Management for Finance View now >>
- HR and Finance Were made for Each Other View now >>
- The Value of Human Capital for Finance Professionals View now >>
- The Business Value of Human Capital Management for Finance View now >>
- The Freedom to Run Your Business Your Way Vendors are challenged to create flexible systems that customers can tailor to particular business strategies and industry needs. But the flexibility should not...
- Research Report: The Big Data Opportunity for HR and Finance If CEOs, CFOs, CIOs, and CHROs want to drive their businesses forward, they will need to quickly recognize the enormous value of big...
- All Financial IT Webcasts
Computerworld's Best Places to Work in IT 2013 list featured Quicken Loans, Securian, Vanguard and other top finance organizations. Honorees say the distinction helps them recruit top talent and boost staff morale.
Want to join this elite group? Nominate your organization for our 2014 list.