Skip to main content

Essay - Credit Card Skimming

The advent of the credit card or e-money has changed the way we were using money. The tyranny of cash is no more there to torment you. It is a high lightened sense of security in the world of uncertainty. Gone are the days when a purchase would have to be postponed because of a cash crunch. But as we know, everything has got two sides. With credit card comes Skimming. Skimming is the unauthorized copying of information of a credit card stored in the magnetic strip. It is used to create a cloned card for making illegal transactions.Instances of Skimming have been reported in ATM, retail shops etc. The sophisticated devices are used along with a miniature camera to read the PIN at the same time. The devices are installed in ATM which is hard to notice. Another technique used is a keypad overlay that is similar to the legitimate keypad below it and presses them when operated, but records or transmits the key log of the PIN entered. The device or group of devices illicitly installed on an ATM is colloquially known as a "skimmer". Now daysCriminals are using ATM skimmers that relay the information via text message eliminating the risk of being caught. In shops, they just have swap through the skimmer to know your card information.
Precautions to be taken;

• Do not pay using credit card in a shop if your card has to be taken out of sight.
• Check the machine used by the shopkeeper.
• If you are suspicious about the card slot on an ATM, report immediately to the concerned officials.
• Check your bank account and credit card statements when you get them.
• If you notice unusual or unauthorised transactions on your account or credit card statement, report it to the bank.

When a customer complained about such incident, the issuer can collect a list of all the cardholders who have complained about fraudulent transactions, and then uses data mining to discover relationships among them like merchants, websites, type of goods etc. For example, if many of the cardholders use a particular merchant, that merchant can be investigated. Algorithms can be written for finding patterns. Merchants must ensure the physical security of their terminals. They should check their workers regularly to avoid such incidents. The penalties for merchants can be severe if they are compromised, ranging from large fines by the issuer to complete ban on business.
Lastly, Be Alert!

Popular posts from this blog

Essay - Strategic Analysis of Tata Group

http://www.study-aids.co.uk/marketing/marketing_essays.html 1. Introduction Tata Group is one of the most renowned and prominent business groups in India. Tata Group is comprised of 96 functioning enterprises which fall under seven different business sectors. Undoubtedly, this group stands as a giant in the business community of India. Tata Group has now expanded its operations in more than 54 countries. This group has spread its network worldwide catering the needs of consumers everywhere. As a result, this group is gaining more popularity in specific countries where they have started their business, some of which include UK, Bangladesh, Vietnam and USA. After their successful operation in India, Tata group is making every effort to penetrate in the international market. It is imperative to analyze their business strategy which is not possible without conducting a thorough SWOT analysis, PESTEL, reviewing their business model and investigating their strategic position. However, it ...

Vodafone Plc SWOT Analysis and Five Forces

Abstract Aim: This essay aims to perform an analysis on the basis of integration of SWOT and Porter’s Five Forces frameworks. The key aim of this essay is to establish the reasons behind the success of Vodafone, which is ranked 3rd in FTSE100 Company ranking, and thereby represent the implications and recommendations. Methodology: This paper is based on integration of the secondary research, which includes recent reports, books and journal articles. Findings: The key findings indicate that Vodafone is a well – established global company with a highly successful internationalization strategy. This implies that Vodafone has a lot of opportunities to take advantage of, despite the recent economic adverse events. 1.0. Introduction This paper aims to demonstrate an analytical essay on the company, which is FTSE100 Top 20 Company as of July, 2012. A chosen company for this report is Vodafone Group Plc, which is ranked third in FTSE100, with the market capitalization of...

Globalization in Nursing

Source: Nursing Dissertations Globalization is a term that is used when referring to the elimination of trade barriers, cultural exchange, and communication. The aim of globalization is to create worldwide openness, in order to promote the wealth of every nation. Through globalization, there occurs technological, political, economic, and cultural exchange. The major factors that make it possible for these exchanges involve infrastructure, communication, and transportation. This term cannot just be discussed and discarded because it has been in existence for many years, and it exists in different forms. The different forms have an impact on the world that we and our descendants will live in. This means that an individual understanding the world that he lives in can be of use in shaping the world, for a better tomorrow. Globalization has been of benefit to the nations, but it also needs to be watched carefully because its potential destabilizing influence needs to be controlled. Globa...