Widespread consideration The use of the Contact Lace Payment System, it is no surprise that the portable point of sale is returning to theft. This kind of robbery is enjoying a new wave of popularity, and it is very difficult to find out how quickly this transaction is. But how much is really danger? And how can you save yourself from POS scams?
The matter of Surunto
Recently, a recent example of POSEft was in Italy when the topic exploded a few days ago when the news agency ANSA reported the arrest in Surunto after trying to steal € 100 from a cash register in the middle of the city. During the search, law enforcement agencies allegedly found a modified portable POS terminal.
This was not the first time the alleged thief was stopped by such a device. The ANSA reported that they were previously arrested in Rome. The device shown in the photos circulated by the media is visible a solo, or a portable POS that is able to run freely without connecting to the smartphone. It is a famous type of tool in stalls and markets in view of its ability and ease of use.
This is also not the first time that tech equipment robbers have been arrested. In fact, last year, the ANSA reported in a similar case with the concerns at the Highway Rest Stop.
Hard, but not impossible
Two are possible Mods Oprendi For this kind of scam. The first is easier for the robbers: they steal a purse and later, make a series of small transactions with a stolen card that does not need to enter the pin, as if to imitate a series of short -term purchases. When the limit reaches, the wallet is thrown.
The second method can be described as a type of trolling. Thieves choose high -density crowded places that are likely to be in touch with each other, such as public transportation or lines in commercial institutions. Then they move forward to make a payment request on portable POS, hold it in their hands or hide it in some way, and keep it in the back pocket of pants, bags, pine packs, back bags, etc.
The success rate is very low due to a number of factors. First, it takes about 30 seconds to obtain a transaction verification, before the application should be repeated from the POS. The second is that the POS should be in contact with the card almost Almost, usually within 0.5 to 4 cm. Third, there will be no interference elements, such as other cards. Therefore, the robber should face a very pleasant situation to succeed. Although the success rate is very low, it is not zero, it is better to limit your risk. Here are some points.
How to defend yourself
Without saying that if you put your purse in the back pocket of your pants in a simple view, you are not only in danger of returning the traditional way, but you also make the best view of this new scam. You can choose integrated RFID protection wallets, which create a real obstacle to these types of scams.
Most protection LOO, you can also receive notifications for small contact transactions through your bank app settings. The fraudsters usually choose small quantities, trusting that the affected person will not receive notifications – often the affected person may not be informed of the withdrawal of the money, perhaps by confusing him with other small transactions. If you fall for this scam, it is advisable to contact your bank immediately to dispute over transactions: Since everything is able to detect, it is possible to identify the device used by fraudsters, though they will turn into a new one.
Finally, almost all modern smartphones are now equipped with NFC chip for contract lace payments. Using Portable POS terminals, thefts can often be prevented from the fact that the smartphone must be unlock, so even if a POS terminal on an unannounced phone, there is no transaction.
This story originally appeared Wired Italy And it has been translated from Italian.


