GLOSSARY ENTRY (DERIVED FROM QUESTION BELOW) | ||||||
---|---|---|---|---|---|---|
|
18:55 Mar 18, 2013 |
English to French translations [PRO] Law/Patents - Law: Patents, Trademarks, Copyright / fraude | |||||||
---|---|---|---|---|---|---|---|
|
| ||||||
| Selected response from: Anne-Marie Laliberté (X) Local time: 11:02 | ||||||
Grading comment
|
Summary of answers provided | ||||
---|---|---|---|---|
4 +1 | données écrémées |
| ||
4 | des données clonées |
| ||
4 | vol de données/espionnage de données |
| ||
4 | données écumées (écumage des données) |
| ||
3 | données piratées |
|
Summary of reference entries provided | |||
---|---|---|---|
How does ATM skimming work? |
|
Discussion entries: 2 | |
---|---|
des données clonées Explanation: des données clonées |
| |
Login to enter a peer comment (or grade) |
données écrémées Explanation: Easily found with a little Google research Manœuvres frauduleuses - RBC Vous trouverez ci-après la description des manœuvres frauduleuses servant le plus souvent à accéder aux données personnelles et financières. Écrémage. L'écrémage ... www.rbc.com/rensperssecurite/ca/schemes-and-scams.html - Cached Protection des renseignements personnels - Passeport Canada Prévenir l'écrémage de données. L’écrémage de données se définit comme la lecture des renseignements personnels stockés sur une puce électronique à l’insu du ... www.ppt.gc.ca/eppt/priv.aspx?lang=fra - Cached |
| |||||||||||||||||||||||||||||||||||||||
27 mins confidence:
36 mins confidence:
1 day 17 hrs confidence:
|
17 hrs |
Reference: How does ATM skimming work? Reference information: "skimming" is only one of many possible methods used to steal bank details, and the translation should reflect that, not relate to ANY form of data misappropriation. more about skimming: "In 2008, more than $1 billion was stolen in ATM-related crimes [source: ADT]. Sure, some thieves take the old-fashioned route and crack them right open, but there's a much quieter, high-tech form of theft targeting ATMs. It's called skimming. ATM skimming is like identity theft for debit cards: Thieves use hidden electronics to steal the personal information stored on your card and record your PIN number to access all that hard-earned cash in your account. That's why skimming takes two separate components to work. The first part is the skimmer itself, a card reader placed over the ATM's real card slot [source: Krebs]. When you slide your card into the ATM, you're unwittingly sliding it through the counterfeit reader, which scans and stores all the information on the magnetic strip. However, to gain full access to your bank account on an ATM, the thieves still need your PIN number. That's where cameras come in -- hidden on or near the ATMs, tiny spy cameras are positioned to get a clear view of the keypad and record all the ATM's PIN action [source: Walters]. Always pay attention to objects mounted on the ATM or located close by. A pinhole or off-color piece of plastic could give away the camera's hiding place. Cameras could even be hidden in brochure racks [source: Krebs]. Some ATM skimming schemes employ fake keypads in lieu of cameras to capture PIN numbers. Just like the card skimmers fit over the ATM's true card slot, skimming keypads are designed to mimic the keypad's design and fit over it like a glove. If you notice that the keypad on your ATM seems to protrude oddly from the surface around it, or if you spy an odd color change between the pad and the rest of the ATM, it could be a fake. Unfortunately, there are even more ways for thieves to access your bank account via an ATM --and some of them don't even require skimming. [http://money.howstuffworks.com/atm-skimming.htm] also [http://krebsonsecurity.com/all-about-skimmers/] |
| |
Login to enter a peer comment (or grade) |
Login or register (free and only takes a few minutes) to participate in this question.
You will also have access to many other tools and opportunities designed for those who have language-related jobs (or are passionate about them). Participation is free and the site has a strict confidentiality policy.