Stay Safe: Essential Tips to Protect Yourself from Portable Point-of-Sale Scams

Portable point-of-sale (POS) thefts have resurfaced, boosted by the growing popularity of contactless payment methods. These scams are particularly tricky because the transactions occur so quickly, making them harder to detect. A recent case in Sorrento, Italy, highlights this trend.

In late July, Sorrento law enforcement apprehended a suspect attempting to steal €100 from a cash register in a bar using a modified portable POS terminal. This was not the offender’s first encounter with the law; they had been arrested previously in Rome under similar circumstances. The device involved was noted for its portability and ease of use, often favored in markets and stalls.

Two primary methods are typically employed by these thieves. The first involves physically stealing a wallet and later making small, unauthenticated purchases using the stolen card until the balance is exhausted. The second method takes advantage of crowded places, where the criminal creates a payment request on a portable POS and stealthily places it near victims’ items, such as pockets or bags, hoping to trigger a transaction without the victim noticing.

Despite the low success rate of these scams—thanks to transaction confirmation delays, the need for close proximity between devices, and the presence of interfering RFID cards—opportunistic thieves still pose a risk.

To protect yourself against portable POS scams, consider the following strategies:

  1. Avoid leaving wallets in easily accessible, visible spots, such as back pockets.
  2. Use RFID-blocking wallets to prevent unauthorized scans.
  3. Set up notifications for all contactless transactions with your bank’s app to monitor any unauthorized activity. Scammers typically target small amounts, hoping victims won’t notice.
  4. Ensure your smartphones are secured since most modern devices require an unlock to complete a transaction.

If you ever fall victim to such a scam, contact your bank immediately. They can trace the transaction and potentially identify the device used in the scam.

For more information on preventing scams, visit WIRED.

Total
0
Shares
Leave a Reply

Your email address will not be published. Required fields are marked *

Previous Article

Unlocking Quantum Precision: The Role of a Special Diamond in Fully Open Source Quantum Sensors

Next Article

Mario Nintendo Switch Games Now Available at Unbeatable Prices at Walmart!

Related Posts