Troy Powell

11%
Flag icon
These hacks exploit several vulnerabilities. First, the customer doesn’t have enough expertise to notice a skimmer or a fake ATM. Second, a magnetic-stripe ATM card is easily duplicated. And third, the ATM authentication system—possession of the ATM card and knowledge of the PIN—just isn’t that secure.
A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back
Rate this book
Clear rating
Open Preview