People who eat at Chinese buffett restaurants deserve to get screwed. They are all owned by the Chinese Red Army generals who run the country and bring in tons of illegals.
And they are refusing to name the restaurants,
What’s up with that!!!
There’s a pretty simple solution to this common scam by waiters.
I don’t know why it goes on.
I never ever use credit cards in a restaurant. It’s way too easy to get ripped off that way.
Anytime you let your credit card out of your hand and sight you’re asking for trouble. I am seeing more eateries these days who use a wireless credit card machine to do your check right there at the table, in view of the card holder.
A lot of people are concerned about internet transactions. I had a chat with one of the folks at a credit card company who works in the fraud dept. They said that the vast majority of fraud involves staff in retail stores and restaurants stealing credit card info and that relatively little involves internet purchases (although once the info is stolen, purchases are frequently made on the ‘net).
Lewis said the three people used English names, but spoke in a Chinese dialect.Thanks geo.
I always use cash when eating out because of stuff like this.
The eastern Europeans are much more skilled at scaling this sort of thing. Here's an example:
The indictment alleges that the trio schemed to break into cash register terminals at various locations of the Dallas-based restaurant chain between April 30 and Sept. 22, 2007. They are accused of stealing credit and debit card Track 2 magnetic stripe data and selling it to others who used it to make fraudulent purchases. Track 2 data includes the customer's account number, expiration data and security code.Yastremskiy and Suvorov, also known as "Maksik" and "JonnyHell" respectively, allegedly gained unauthorized access to the point-of-sale servers at each restaurant and installed a packet sniffer designed to capture Track 2 data as it moved from the POS servers to the computer system at the restaurant's headquarters and a data processor's network. According to the indictment, the pair falsely represented themselves as being authorized to gain access to the systems.
At each restaurant, the packet sniffer created a file to store the Track 2 data until the suspects collected the information. A defect in the malware shut down the sniffer whenever the compromised POS server rebooted, which forced the men to regularly reactivate the malware, the complaint said.
At a Dave & Buster's restaurant in Islandia, N.Y., the packet sniffer captured data for approximately 5,000 credit and debit cards, which the men sold to others who used the information to make purchases online and at various retail locations, according to the indictment. The theft eventually caused losses of nearly $600,000.
The case highlights the importance of securing POS systems, said Diana Kelley, partner at consulting firm Security Curve.
Duh, Diana. But really, the flaw is in the design of the credit card system. Until that's fixed, POS systems will remain a point of vulnerability.
More recently, Heartland Payment Systems (HPY) had a problem, announced on Inauguration Day. They process transactions for a large number of small retailers. Now we're talking scalability! Wholesale fraud!
But not to worry. Fraud losses are still in the single-digit basis point range. Plastic companies have bigger worries these days.