Sunday, July 25, 2010
Hacker said Plow ATM Two New Techniques
SAN FRANCISCO - Still hot on the memories of how the crime with the technique of skimming at ATMs for customers' money to dredge the bloom in Indonesia. As a result of these crimes menangguk banks losses because they have to replace the missing funds pelangannya.
ATM skimming may be a crime through the advantage of a customer because it was done by way of stealing an ATM card PIN as the entrance of the transaction. In fact, there are techniques that are not less piracy ATM hacking techniques used by malicious software.
A hacker from IOActive, a leading digital security company based in the U.S. and UK, will reveal two new techniques hijack an ATM in the Black Hat USA conference which is planned to be held in late July 2010 Sin City later. He will present his paper "Jackpotting Automated Teller Machines."
"I'm always glad to see the scene in Terminator 2 when John Connor was walking toward the ATM and then brought his Atari device to card reader and take a sheet of money that comes out the ATM machine," said Jack in the Black Hat website. "I think I can do the same thing."
Jack promised to take the two most recent models of ATM machines among the types of ATM machines used by some banks at this time to demonstrate it. According to this technique can release large amounts of money from an ATM, either carried out directly or remotely.
Initially, the discovery techniques will be demonstrated in the same conference in Las Vegas last year. However, the plan failed to do in the last minute for reasons which he called non-technical issues beyond his control at that time.
IOActive berpoetensi states that the techniques used to deplete ATM wicked. It also has warned ATM manufacturers to anticipate weaknesses. Besides expressing ATM plowing techniques, he also will present ways to protect the ATM machines of potential crimes.
Labels:
style1
Subscribe to:
Post Comments (Atom)
2 comments:
Be careful with this activity..
Nice post and thanks for share it,.
Good Luck!
hahahahah ....
thank you for your comment
but this is only a technique from hackers usa
Post a Comment