13 Results for

skimmer

Article

Skimmer brings your social streams to the desktop

A new content stream aggregator called Skimmer lets you keep an eye on Twitter, Facebook, Flickr, and more--all in one place using Adobe AIR.

By Mar. 24, 2009

Article

13 indicted in $2M gas station card-skimming scheme

Pump-mounted devices used Bluetooth chips that allowed the thieves to retrieve the data without having to physically connect to the devices, prosecutors allege.

By Jan. 22, 2014

Article

Social updater qStatus comes to Windows

New Windows software app qStatus has come all the way from a paid app for jailbroken iPhones to a very legitimate, useful desktop application for updating your Twitter and Facebook status on the fly.

By Apr. 19, 2010

Article

Researchers find avenues for fraud in Square

Mobile payments system can be used to transfer money into accounts from stolen cards and to skim cards, researchers say.

By Aug. 4, 2011

Article

Security Bites 119: Does the Internet need its own Interpol?

Chief security adviser at F-Secure talks about cybercrime and the need for a new international agency to handle such crimes.

By Oct. 24, 2008

Article

BP tech team: Priority is to 'see' oil underwater

A "skunk works" team is considering a wide range of technologies to clean up oil in the Gulf, using ideas from outsiders at a scale never done before.

By Jul. 22, 2010

Article

BP crowdsources Gulf clean-up technologies

Even as the world waits to see whether BP can permanently stem the flow of oil into the Gulf, the company is evaluating technologies to clean up the disaster.

By Jul. 20, 2010

Article

Verizon: More breaches but less data lost. Huh?!

Hacking, malware, and physical attacks such as ATM and gas pump skimming are the most popular methods for stealing data, report says.

By Apr. 18, 2011

Article

High-tech bank robbers phone it in

Through a method called skimming, a digital copy of your debit card is made at a compromised ATM, and then the data is sent over SMS to awaiting criminals.

By Oct. 9, 2008

Article

FAQ: Demystifying ID fraud

The trail of online fraud leads through malicious Web sites, hacked databases, underground criminal forums, and across country borders. We'll guide you through it.

By May. 5, 2009