Training

ATM / POS Fraud , Events , Fraud Management & Cybercrime

Developments in ATM Fraud

Developments in ATM Fraud

ATM skimming attack sophistication, and recent global upticks in ATM cash-out schemes, have put a spotlight on ATM-related fraud. Banking institutions, in particular, have struggled to keep up with some of these emerging ATM fraud schemes. One challenge banks and credit unions face is that their ATM networks are often made up of terminals from multiple manufacturers. That's made anti-skimming hardware and software upgrades or other retrofitting on existing equipment difficult.

See Also: Better Defense Against Identity Theft and Application Fraud

In this session, Graham Mott, head of development at LINK Scheme will walk attendees through the types of fraudulent attack that are being used today and offer advice on how to counteract the schemes.

Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.

Background

The battle between fraudsters and the ATM operators is ongoing and apparently never-ending. Initial successes with the first generation of anti-skimming devices lead to the growth of "back to basic" techniques which require the minimum technology and organisational support. Now, as new defense mechanisms counter the low-tech, a new wave of high tech devices are coming on stream, as well as super high-tech techniques like malware and system hacking attacks which involve long term investment, detailed technical skill and the organisation to run multi-country operations in a very short space of time.

This session was recorded during the 2014 Fraud Summit London. Additional recordings include:

Webinar Registration

Premium Members Only

OnDemand access to this webinar is restricted to Premium Members.

Join Now to Access
Have an account? Sign in.


Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.