SlideShare a Scribd company logo
1 of 12
Gujarat Power Engineering
& Research Institute
By-
-Karan Thawani(58)Contents:-
- ATM FRAUDS
SUB: Cyber Security
ATM FRAUDS
o ATM FRAUDS In general
ATM fraud can include any
deliberate 'criminal' technique
which involves the use of an
ATM to obtain something of
value.
o Attacks against ATMs may be classified as ATM physical attacks
and ATM fraud.
o More than 70 percent of financial institutions experienced an
increase in ATM/debit card fraud claims in 2011.
o The U.S. Secret Service reports $8.5B in annual U.S. credit card
fraud losses, including ATM skimming.
o Ram raids are those threats when criminals physically break out
ATMs from the wall at the institution.
oCriminals go through the financial institution's telephone banking
service to change PIN numbers..
Types
• Fake Keypad
• PIN Compromise
Types
• Card Skimming
• Cash Trapping
Types
• Transaction Reversal
Types Of ATM Frauds
Fake Keypad
o This is a fabricated device that looks exactly the machine’s
keypad, it is placed beside it to capture the PIN of the
cardholder.
o ATM skimming Device card reader
which can be disguised to look like a
part of the machine.
o The card reader saves the users'
card number and pin code, which is
then replicated into a counterfeit copy
for theft.
o It help criminals in
a) Knowing Account information
b) Pin compromise
o ATM card entry slot skimmers have
various shapes and sizes
What is ATM Skimming
How PIN is Compromised
o It obtaining debit card information
by unauthorized individual.
o Shoulder surfing or using use of a
miniature camera.
oVideo surveillance
o Hidden video camera
oOverhead cell phone camera
oRemotely positioned cameras
o PIN pad overlay
oThe Ruler Gang uses a device that looks like
a ruler to trap cash in ATMs.
o A member of the group will install a “false
ATM presenter” or a fabricated ruler device
into the cash shutter of the ATM.
oA customer who will withdraw amount to said
ATM will not notice the device and when he
tries to get the money withdrawn, he will
have a hard time since the cash will be
trapped inside.
oWhen the disappointed customer leaves the
ATM to ask for assistance, a member of the
Ruler Gang will thereafter remove the device
including the cash still glued on it.
Cash Trapping
o TRF involves the creation of an error that
makes it appear as though the cash had not
been dispensed.
o The account is re-credited the amount
‘withdrawn’ but the criminal pockets the
money.
o It could be a physical grab (similar to cash
trapping) or a corruption of the transaction
message.
Transaction Reversal Fraud
o Cover up: Always cover your one hand with the other hand while
keying in the PIN number. By protecting your PIN, criminals do not
have access to your account when card information is compromised
(this method is useful when transacting at an ATM or Point of Sale).
o InContact: Ensure you have inContact activated on all your
transactional accounts (credit cards, cheque cards etc.) to ensure
that you always know when fraudulent activity takes place on your
account/s.
o Stand close to the ATM and use your body as a shield and extra
security to protect your Card and PIN.
o Do not accept assistance, guidance or allow anyone to interfere
with your transaction - fraudsters sometimes pose as bank officials
by offering assistance or interfering with your transaction.
o Only insert the card when the ATM prompts you to do so -
fraudsters jam ATMs to create confusion with customers.
Prevention
o Control your exposure in terms of daily ATM limits - lower your
daily ATM limits if the limit is set at a level unrealistic to what you
would usually spend.
o Use ATMs you are familiar with and do not use ATMs in
secluded areas or late at night.
o Report any suspicious activity/tampering at the ATM to your
bank immediately.
o Check the card scanner slot: Give it a wiggle. Often skimming
devices are false panels that can be detected and will come lose.
o Choose your ATM carefully: Use ATMs in high traffic areas
that are well lit.
oNever force your card into an ATM slot.
Atm frauds

More Related Content

What's hot (20)

Computer forensics ppt
Computer forensics pptComputer forensics ppt
Computer forensics ppt
 
Fraud Presentation
Fraud PresentationFraud Presentation
Fraud Presentation
 
Introduction to Cryptocurrency (Bitcoin)
Introduction to Cryptocurrency (Bitcoin)Introduction to Cryptocurrency (Bitcoin)
Introduction to Cryptocurrency (Bitcoin)
 
Bank frauds
Bank fraudsBank frauds
Bank frauds
 
Hacking
HackingHacking
Hacking
 
Identity Theft ppt
Identity Theft pptIdentity Theft ppt
Identity Theft ppt
 
Cyber forensics ppt
Cyber forensics pptCyber forensics ppt
Cyber forensics ppt
 
Cryptocurrencies and AML
Cryptocurrencies and AMLCryptocurrencies and AML
Cryptocurrencies and AML
 
Raw- Research & Analysis Wing
Raw- Research & Analysis WingRaw- Research & Analysis Wing
Raw- Research & Analysis Wing
 
Cyber fraud in banks
Cyber fraud in banksCyber fraud in banks
Cyber fraud in banks
 
cyber security
cyber securitycyber security
cyber security
 
Security features of atm
Security features of atmSecurity features of atm
Security features of atm
 
Telephone fraud PPT for Fraud Conference at Portsmouth University, 2014
Telephone fraud PPT for Fraud Conference at Portsmouth University, 2014Telephone fraud PPT for Fraud Conference at Portsmouth University, 2014
Telephone fraud PPT for Fraud Conference at Portsmouth University, 2014
 
Identity Theft
Identity Theft Identity Theft
Identity Theft
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 
Crypto currency
Crypto currencyCrypto currency
Crypto currency
 
Internet Fraud
Internet FraudInternet Fraud
Internet Fraud
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Automated Teller Machine
Automated Teller MachineAutomated Teller Machine
Automated Teller Machine
 

Viewers also liked

Receiving end circle diagram
Receiving end circle diagram Receiving end circle diagram
Receiving end circle diagram GPERI
 
Tarrif and load curves
Tarrif and load curvesTarrif and load curves
Tarrif and load curvesGPERI
 
Judgement on Zambezi Portland Cement
Judgement on Zambezi Portland CementJudgement on Zambezi Portland Cement
Judgement on Zambezi Portland CementZambia Glory
 
The Shape of the Internet is Changing
The Shape of the Internet is ChangingThe Shape of the Internet is Changing
The Shape of the Internet is ChangingNUI Galway
 
History of Management
History of ManagementHistory of Management
History of ManagementGPERI
 
Mini project on core banking solutions
Mini project on core banking solutionsMini project on core banking solutions
Mini project on core banking solutionskeerthiredddy
 
ATM Fraud - Ignite Style
ATM Fraud - Ignite StyleATM Fraud - Ignite Style
ATM Fraud - Ignite StyleShane Curtin
 
reciprocating pump
reciprocating pumpreciprocating pump
reciprocating pumpGPERI
 
Presentation on security feature of atm (2)
Presentation on security feature of atm (2)Presentation on security feature of atm (2)
Presentation on security feature of atm (2)Siya Agarwal
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrimepatelripal99
 
Digital Bank, May 2014
Digital Bank, May 2014Digital Bank, May 2014
Digital Bank, May 2014Chris Skinner
 

Viewers also liked (11)

Receiving end circle diagram
Receiving end circle diagram Receiving end circle diagram
Receiving end circle diagram
 
Tarrif and load curves
Tarrif and load curvesTarrif and load curves
Tarrif and load curves
 
Judgement on Zambezi Portland Cement
Judgement on Zambezi Portland CementJudgement on Zambezi Portland Cement
Judgement on Zambezi Portland Cement
 
The Shape of the Internet is Changing
The Shape of the Internet is ChangingThe Shape of the Internet is Changing
The Shape of the Internet is Changing
 
History of Management
History of ManagementHistory of Management
History of Management
 
Mini project on core banking solutions
Mini project on core banking solutionsMini project on core banking solutions
Mini project on core banking solutions
 
ATM Fraud - Ignite Style
ATM Fraud - Ignite StyleATM Fraud - Ignite Style
ATM Fraud - Ignite Style
 
reciprocating pump
reciprocating pumpreciprocating pump
reciprocating pump
 
Presentation on security feature of atm (2)
Presentation on security feature of atm (2)Presentation on security feature of atm (2)
Presentation on security feature of atm (2)
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrime
 
Digital Bank, May 2014
Digital Bank, May 2014Digital Bank, May 2014
Digital Bank, May 2014
 

Similar to Atm frauds

Automated Teller Machine
Automated Teller MachineAutomated Teller Machine
Automated Teller MachineSowie Althea
 
Skimming: Review of Credit & Debit Card Fraud
Skimming: Review of Credit & Debit Card FraudSkimming: Review of Credit & Debit Card Fraud
Skimming: Review of Credit & Debit Card FraudJason Sookram
 
automated teller machines
automated teller  machinesautomated teller  machines
automated teller machinestejinderubs
 
ATM ROBBERY IN BANGLADESH
ATM ROBBERY IN BANGLADESHATM ROBBERY IN BANGLADESH
ATM ROBBERY IN BANGLADESHShimanto Deb
 
ATM THEFT BY PRAKASH JANAWADE
ATM THEFT BY PRAKASH JANAWADEATM THEFT BY PRAKASH JANAWADE
ATM THEFT BY PRAKASH JANAWADEPrakash Janawade
 
ATM Skimming in the Caribbean
ATM Skimming in the CaribbeanATM Skimming in the Caribbean
ATM Skimming in the CaribbeanGiovanni James
 
Atm thefts presentation
Atm thefts presentationAtm thefts presentation
Atm thefts presentationSenorErnestoIV
 
ATM THEFT (Useful-Info)-105
ATM THEFT (Useful-Info)-105ATM THEFT (Useful-Info)-105
ATM THEFT (Useful-Info)-105nrvalluri
 
ATM Skimming Devices
ATM Skimming DevicesATM Skimming Devices
ATM Skimming Devicessavingsguide
 
Automated taller machine (atm)
Automated taller machine (atm)Automated taller machine (atm)
Automated taller machine (atm)amanjit9306
 
Atm awareness guide
Atm awareness guideAtm awareness guide
Atm awareness guideJude Dsouza
 
Atm Thefts - Watch and Learn!
Atm Thefts - Watch and Learn!Atm Thefts - Watch and Learn!
Atm Thefts - Watch and Learn!ikrakovsky
 
Atm Thefts 1
Atm Thefts 1Atm Thefts 1
Atm Thefts 1Nafass
 

Similar to Atm frauds (20)

ATM.pdf.pptx
ATM.pdf.pptxATM.pdf.pptx
ATM.pdf.pptx
 
NR ATM Frauds.pptx
NR ATM Frauds.pptxNR ATM Frauds.pptx
NR ATM Frauds.pptx
 
Automated Teller Machine
Automated Teller MachineAutomated Teller Machine
Automated Teller Machine
 
Skimming: Review of Credit & Debit Card Fraud
Skimming: Review of Credit & Debit Card FraudSkimming: Review of Credit & Debit Card Fraud
Skimming: Review of Credit & Debit Card Fraud
 
Atm
AtmAtm
Atm
 
automated teller machines
automated teller  machinesautomated teller  machines
automated teller machines
 
Skimming is a Scam
Skimming is a ScamSkimming is a Scam
Skimming is a Scam
 
ATM ROBBERY IN BANGLADESH
ATM ROBBERY IN BANGLADESHATM ROBBERY IN BANGLADESH
ATM ROBBERY IN BANGLADESH
 
ATM THEFT BY PRAKASH JANAWADE
ATM THEFT BY PRAKASH JANAWADEATM THEFT BY PRAKASH JANAWADE
ATM THEFT BY PRAKASH JANAWADE
 
ATM Skimming in the Caribbean
ATM Skimming in the CaribbeanATM Skimming in the Caribbean
ATM Skimming in the Caribbean
 
Atm machine
Atm machineAtm machine
Atm machine
 
Atm theft
Atm theftAtm theft
Atm theft
 
Atm thefts presentation
Atm thefts presentationAtm thefts presentation
Atm thefts presentation
 
ATM THEFT (Useful-Info)-105
ATM THEFT (Useful-Info)-105ATM THEFT (Useful-Info)-105
ATM THEFT (Useful-Info)-105
 
ATM Skimming Devices
ATM Skimming DevicesATM Skimming Devices
ATM Skimming Devices
 
Automated taller machine (atm)
Automated taller machine (atm)Automated taller machine (atm)
Automated taller machine (atm)
 
Atm awareness guide
Atm awareness guideAtm awareness guide
Atm awareness guide
 
Atm theft1
Atm theft1Atm theft1
Atm theft1
 
Atm Thefts - Watch and Learn!
Atm Thefts - Watch and Learn!Atm Thefts - Watch and Learn!
Atm Thefts - Watch and Learn!
 
Atm Thefts 1
Atm Thefts 1Atm Thefts 1
Atm Thefts 1
 

Recently uploaded

Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingBootNeck1
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleAlluxio, Inc.
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptMadan Karki
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONjhunlian
 
The SRE Report 2024 - Great Findings for the teams
The SRE Report 2024 - Great Findings for the teamsThe SRE Report 2024 - Great Findings for the teams
The SRE Report 2024 - Great Findings for the teamsDILIPKUMARMONDAL6
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncssuser2ae721
 
NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...
NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...
NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...Amil Baba Dawood bangali
 
National Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfNational Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfRajuKanojiya4
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating SystemRashmi Bhat
 
welding defects observed during the welding
welding defects observed during the weldingwelding defects observed during the welding
welding defects observed during the weldingMuhammadUzairLiaqat
 
Steel Structures - Building technology.pptx
Steel Structures - Building technology.pptxSteel Structures - Building technology.pptx
Steel Structures - Building technology.pptxNikhil Raut
 
Industrial Safety Unit-I SAFETY TERMINOLOGIES
Industrial Safety Unit-I SAFETY TERMINOLOGIESIndustrial Safety Unit-I SAFETY TERMINOLOGIES
Industrial Safety Unit-I SAFETY TERMINOLOGIESNarmatha D
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating SystemRashmi Bhat
 

Recently uploaded (20)

Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event Scheduling
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at Scale
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.ppt
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
 
The SRE Report 2024 - Great Findings for the teams
The SRE Report 2024 - Great Findings for the teamsThe SRE Report 2024 - Great Findings for the teams
The SRE Report 2024 - Great Findings for the teams
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
 
NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...
NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...
NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...
 
National Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfNational Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdf
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating System
 
welding defects observed during the welding
welding defects observed during the weldingwelding defects observed during the welding
welding defects observed during the welding
 
Steel Structures - Building technology.pptx
Steel Structures - Building technology.pptxSteel Structures - Building technology.pptx
Steel Structures - Building technology.pptx
 
Industrial Safety Unit-I SAFETY TERMINOLOGIES
Industrial Safety Unit-I SAFETY TERMINOLOGIESIndustrial Safety Unit-I SAFETY TERMINOLOGIES
Industrial Safety Unit-I SAFETY TERMINOLOGIES
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating System
 

Atm frauds

  • 1. Gujarat Power Engineering & Research Institute By- -Karan Thawani(58)Contents:- - ATM FRAUDS SUB: Cyber Security
  • 2. ATM FRAUDS o ATM FRAUDS In general ATM fraud can include any deliberate 'criminal' technique which involves the use of an ATM to obtain something of value. o Attacks against ATMs may be classified as ATM physical attacks and ATM fraud.
  • 3. o More than 70 percent of financial institutions experienced an increase in ATM/debit card fraud claims in 2011. o The U.S. Secret Service reports $8.5B in annual U.S. credit card fraud losses, including ATM skimming. o Ram raids are those threats when criminals physically break out ATMs from the wall at the institution. oCriminals go through the financial institution's telephone banking service to change PIN numbers..
  • 4. Types • Fake Keypad • PIN Compromise Types • Card Skimming • Cash Trapping Types • Transaction Reversal Types Of ATM Frauds
  • 5. Fake Keypad o This is a fabricated device that looks exactly the machine’s keypad, it is placed beside it to capture the PIN of the cardholder.
  • 6. o ATM skimming Device card reader which can be disguised to look like a part of the machine. o The card reader saves the users' card number and pin code, which is then replicated into a counterfeit copy for theft. o It help criminals in a) Knowing Account information b) Pin compromise o ATM card entry slot skimmers have various shapes and sizes What is ATM Skimming
  • 7. How PIN is Compromised o It obtaining debit card information by unauthorized individual. o Shoulder surfing or using use of a miniature camera. oVideo surveillance o Hidden video camera oOverhead cell phone camera oRemotely positioned cameras o PIN pad overlay
  • 8. oThe Ruler Gang uses a device that looks like a ruler to trap cash in ATMs. o A member of the group will install a “false ATM presenter” or a fabricated ruler device into the cash shutter of the ATM. oA customer who will withdraw amount to said ATM will not notice the device and when he tries to get the money withdrawn, he will have a hard time since the cash will be trapped inside. oWhen the disappointed customer leaves the ATM to ask for assistance, a member of the Ruler Gang will thereafter remove the device including the cash still glued on it. Cash Trapping
  • 9. o TRF involves the creation of an error that makes it appear as though the cash had not been dispensed. o The account is re-credited the amount ‘withdrawn’ but the criminal pockets the money. o It could be a physical grab (similar to cash trapping) or a corruption of the transaction message. Transaction Reversal Fraud
  • 10. o Cover up: Always cover your one hand with the other hand while keying in the PIN number. By protecting your PIN, criminals do not have access to your account when card information is compromised (this method is useful when transacting at an ATM or Point of Sale). o InContact: Ensure you have inContact activated on all your transactional accounts (credit cards, cheque cards etc.) to ensure that you always know when fraudulent activity takes place on your account/s. o Stand close to the ATM and use your body as a shield and extra security to protect your Card and PIN. o Do not accept assistance, guidance or allow anyone to interfere with your transaction - fraudsters sometimes pose as bank officials by offering assistance or interfering with your transaction. o Only insert the card when the ATM prompts you to do so - fraudsters jam ATMs to create confusion with customers. Prevention
  • 11. o Control your exposure in terms of daily ATM limits - lower your daily ATM limits if the limit is set at a level unrealistic to what you would usually spend. o Use ATMs you are familiar with and do not use ATMs in secluded areas or late at night. o Report any suspicious activity/tampering at the ATM to your bank immediately. o Check the card scanner slot: Give it a wiggle. Often skimming devices are false panels that can be detected and will come lose. o Choose your ATM carefully: Use ATMs in high traffic areas that are well lit. oNever force your card into an ATM slot.