ATM skimming schemes are responsible for about $350,000 of monetary losses each day in the United States and is considered to be the number one ATM-related crime. Here are a few things to look for the next time you need to hit the ATM. Fake readersCriminals place a fake device on top of an otherwise valid card reader and steal card information and PIN numbersWhat’s wrong here?In this picture, a fake reader has been placed on top of the machine’s authentic slotAn authentic card reader This is what the reader looks like without the fraudulent device. Note the green-lighted perimeter Prying eyes Shoulder-surfing thieves stand behind and watch customers key in PINs. “Un-security” camera Another scam involves mounting hidden cameras above in order to watch customers enter PINsSee more image galleriesInside Hoover Dam security: A private tour of the critical infrastructure icon Copper theft epidemic: Photos from the field in DetroitSpy tools: what private investigators use to sleuth Related content news Google Chrome zero-day jumps onto CISA's known vulnerability list A serious security flaw in Google Chrome, which was discovered under active exploitation in the wild, is a new addition to the Cybersecurity and Infrastructure Agency’s Known Exploited vulnerabilities catalog. By Jon Gold Oct 03, 2023 3 mins Zero-day vulnerability brandpost The advantages and risks of large language models in the cloud Understanding the pros and cons of LLMs in the cloud is a step closer to optimized efficiency—but be mindful of security concerns along the way. By Daniel Prizmant, Senior Principal Researcher at Palo Alto Networks Oct 03, 2023 5 mins Cloud Security news Arm patches bugs in Mali GPUs that affect Android phones and Chromebooks The vulnerability with active exploitations allows local non-privileged users to access freed-up memory for staging new attacks. By Shweta Sharma Oct 03, 2023 3 mins Android Security Vulnerabilities news UK businesses face tightening cybersecurity budgets as incidents spike More than a quarter of UK organisations think their cybersecurity budget is inadequate to protect them from growing threats. By Michael Hill Oct 03, 2023 3 mins CSO and CISO Risk Management Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe