{"id":16129,"date":"2024-09-11T12:02:39","date_gmt":"2024-09-11T08:32:39","guid":{"rendered":"https:\/\/www.itpiran.net\/blog\/?p=16129"},"modified":"2024-09-11T12:02:39","modified_gmt":"2024-09-11T08:32:39","slug":"what-is-skimming-fraud-and-how-to-protect-yourself","status":"publish","type":"post","link":"https:\/\/www.itpiran.net\/blog\/tr\/tutorials\/what-is-skimming-fraud-and-how-to-protect-yourself\/","title":{"rendered":"Skimming doland\u0131r\u0131c\u0131l\u0131\u011f\u0131 nedir ve kendinizi nas\u0131l koruyabilirsiniz?"},"content":{"rendered":"<h2 id=\"%d9%85%d9%82%d8%af%d9%85%d9%87\">girii\u015f<\/h2>\n<p>Skimming, kredi veya banka kart\u0131n\u0131n manyetik \u015feridinde veya \u00e7ipinde bulunan verilerin kart ATM&#039;ye tak\u0131ld\u0131\u011f\u0131nda okunmas\u0131 ve kopyalanmas\u0131yla ger\u00e7ekle\u015ftirilen bir t\u00fcr arac\u0131 sald\u0131r\u0131d\u0131r. ATM&#039;lerin skimming doland\u0131r\u0131c\u0131l\u0131\u011f\u0131 yapmak i\u00e7in manip\u00fcle edilmesinin bir\u00e7ok yolu vard\u0131r. Bir y\u00f6ntem, do\u011frudan kart okuyucunun \u00fczerine veya hatta banka \u015fubelerinin kap\u0131 a\u00e7\u0131c\u0131lar\u0131na ek bir okuyucu takmakt\u0131r; \u00e7\u00fcnk\u00fc ATM b\u00f6l\u00fcm\u00fcne eri\u015fmek i\u00e7in genellikle bir kart gerekir. Gizli kameralar genellikle ATM tu\u015f tak\u0131m\u0131n\u0131n \u00fczerindeki plastik \u015feritlere yerle\u015ftirilir, b\u00f6ylece sahibi girdi\u011finde PIN kodu g\u00f6r\u00fclebilir. Bu kameralar genellikle iyi gizlenmi\u015ftir ve bu nedenle en dikkatli ATM kullan\u0131c\u0131s\u0131 taraf\u0131ndan bile tespit edilmeleri zordur. PIN kodu girilirken kaydetmek i\u00e7in sahte tu\u015f tak\u0131mlar\u0131 da s\u0131kl\u0131kla kullan\u0131l\u0131r. PIN kodlar\u0131n\u0131 bulmak i\u00e7in termal g\u00f6r\u00fcnt\u00fcleme kameralar\u0131 kullanan y\u00f6ntemler bile vard\u0131r.<\/p>\n<p>Kart kopyalama, d\u00f6viz bozdururken, benzin istasyonunda \u00f6deme yaparken veya ma\u011fazalarda al\u0131\u015fveri\u015f yaparken de yap\u0131labilir. Bu durumlarda, kart sahibinin bilgisi olmadan ikinci bir sahte cihaz taraf\u0131ndan kart okunur. Kart bilgileri \u00e7al\u0131nd\u0131ktan sonra, &quot;beyaz kart&quot; olarak da bilinen bo\u015f bir karta aktar\u0131l\u0131r. Su\u00e7lular daha sonra para \u00e7ekip bu kart ve yedek PIN koduyla \u00f6deme yapabilirler. Kart kopyalaman\u0131n m\u00fcmk\u00fcn olmas\u0131n\u0131n nedeni, manyetik \u015ferit verilerinin serbest\u00e7e eri\u015filebilir olmas\u0131 ve modern \u00e7ipli kartlarda oldu\u011fu gibi kart\u0131n kendisi taraf\u0131ndan korunmamas\u0131d\u0131r.<\/p>\n<h2 id=\"%da%86%da%af%d9%88%d9%86%d9%87-%d9%85%db%8c-%d8%aa%d9%88%d8%a7%d9%86%db%8c%d8%af-%d8%a7%d8%b2-%d8%ae%d9%88%d8%af-%d8%af%d8%b1-%d8%a8%d8%b1%d8%a7%d8%a8%d8%b1-%d8%a7%d8%b3%da%a9%db%8c%d9%85%db%8c%d9%86\">Kendinizi doland\u0131r\u0131c\u0131l\u0131ktan nas\u0131l koruyabilirsiniz?<\/h2>\n<p>\u00c7o\u011fu banka, ATM&#039;lerinin kurcalanmad\u0131\u011f\u0131ndan emin olmak i\u00e7in kontrol eder. Genellikle, ATM&#039;lere entegre edilmi\u015f, doland\u0131r\u0131c\u0131l\u0131k giri\u015fimlerini tespit edip \u00f6nleyen \u00f6zel teknolojiler olan doland\u0131r\u0131c\u0131l\u0131k \u00f6nleme mod\u00fclleriyle donat\u0131lm\u0131\u015ft\u0131r. Bu mod\u00fcllerin \u00e7al\u0131\u015fma \u015fekillerinden baz\u0131lar\u0131 \u015funlard\u0131r:<\/p>\n<ul>\n<li>Veri okunmas\u0131n\u0131n engellenmesi: Baz\u0131 mod\u00fcller, kart\u0131n manyetik \u015feridinden veri okuma cihaz\u0131n\u0131n veri okumas\u0131n\u0131 engelleyen parazit sinyalleri s\u00fcrekli olarak yayar.<\/li>\n<li>Fiziksel engeller: Baz\u0131 anti-skimming mod\u00fclleri, kart okuyucusuna kart kopyalama cihazlar\u0131n\u0131n ba\u011flanmas\u0131n\u0131 engeller.<\/li>\n<li>Sens\u00f6rler ve \u0130zleme: Geli\u015fmi\u015f mod\u00fcller, ATM&#039;ye ba\u011fl\u0131 ola\u011fand\u0131\u015f\u0131 bir aktiviteyi veya \u015f\u00fcpheli bir \u015feyi tespit etmek i\u00e7in sens\u00f6rler ve kameralar kullan\u0131r. Bir \u015fey tespit edilirse, tehlikeye at\u0131lan cihaz kendini kapatabilir.<\/li>\n<li>Manyetik alan analizi: Baz\u0131 anti-skimming sistemleri, kart yuvas\u0131 alan\u0131ndaki manyetik alan\u0131 \u00f6l\u00e7en ind\u00fcksiyon bobinleriyle \u00e7al\u0131\u015f\u0131r ve bu sayede kart kopyalama cihazlar\u0131n\u0131n yapt\u0131\u011f\u0131 de\u011fi\u015fiklikleri tespit edebilirler.<\/li>\n<\/ul>\n<p>Kart bilgilerinizin \u00e7al\u0131nmas\u0131n\u0131 \u00f6nlemek i\u00e7in her zaman dikkatli olman\u0131z ve \u00e7e\u015fitli \u00f6nleyici tedbirler alman\u0131z \u00f6nemlidir:<\/p>\n<ul>\n<li>PIN&#039;i Gizle: PIN&#039;i girerken klavyeyi elinizle kapat\u0131n.<\/li>\n<li>Dikkatli olun: ATM&#039;de veya \u00f6deme terminalinde \u015f\u00fcpheli herhangi bir \u015feye, \u00f6rne\u011fin bo\u015f veya b\u00fcy\u00fck bir kart yuvas\u0131na veya di\u011fer garip eklentilere dikkat edin.<\/li>\n<li>Hesab\u0131n\u0131z\u0131 d\u00fczenli olarak kontrol edin: Hesap \u00f6zetlerinizi s\u0131k s\u0131k kontrol edin ve a\u00e7\u0131klanamayan herhangi bir \u00e7ekim veya i\u015flem fark ederseniz derhal bankan\u0131z\u0131 bilgilendirin.<\/li>\n<li>Kart\u0131n\u0131z\u0131 g\u00fcncelleyin: M\u00fcmk\u00fcnse EMV \u00e7ipli kart kullan\u0131n, \u00e7\u00fcnk\u00fc manyetik \u015feritli kartlara g\u00f6re kopyalanmas\u0131 daha zordur.<\/li>\n<li>Temass\u0131z \u00f6demeler: Doland\u0131r\u0131c\u0131l\u0131k ma\u011fduru olma riskini azaltmak i\u00e7in Google Pay gibi temass\u0131z kartlar\u0131 veya mobil \u00f6deme uygulamalar\u0131n\u0131 kullan\u0131n.<\/li>\n<li>Halka a\u00e7\u0131k Wi-Fi&#039;lerden ka\u00e7\u0131n\u0131n: Halka a\u00e7\u0131k Wi-Fi&#039;leri kullan\u0131rken dikkatli olun, \u00e7\u00fcnk\u00fc su\u00e7lular kart bilgilerinize eri\u015fmek i\u00e7in bu a\u011flar\u0131 kullanabilir.<\/li>\n<\/ul>\n<h2 id=\"%da%86%da%af%d9%88%d9%86%d9%87-%d9%85%d8%aa%d9%88%d8%ac%d9%87-%d9%85%db%8c-%d8%b4%d9%88%db%8c%d8%af-%da%a9%d9%87-%d9%82%d8%b1%d8%a8%d8%a7%d9%86%db%8c-%da%a9%d9%84%d8%a7%d9%87%d8%a8%d8%b1%d8%af%d8%a7\">Kart kopyalama doland\u0131r\u0131c\u0131l\u0131\u011f\u0131n\u0131n kurban\u0131 oldu\u011funuzu nas\u0131l anlars\u0131n\u0131z?<\/h2>\n<p>Bazen kart kopyalama i\u015flemine maruz kal\u0131p kalmad\u0131\u011f\u0131n\u0131z\u0131 anlamak zor olabilir, ancak dikkat etmeniz gereken baz\u0131 i\u015faretler vard\u0131r. Banka ekstrelerinizi d\u00fczenli olarak kontrol etmelisiniz. Bilinmeyen ve a\u00e7\u0131klanamayan \u00e7ekimler, kart kopyalama i\u015fleminin veya birinin izniniz olmadan hesab\u0131n\u0131za eri\u015fti\u011finin bir i\u015faretidir. Ayr\u0131ca, hakk\u0131nda hi\u00e7bir \u015fey bilmedi\u011finiz \u00e7evrimi\u00e7i al\u0131\u015fveri\u015fler yap\u0131ld\u0131ysa, bu, kart kopyalama ma\u011fduru oldu\u011funuzu g\u00f6sterebilir.<\/p>\n<h2 id=\"%d8%a7%da%af%d8%b1-%d8%a7%d8%b3%da%a9%db%8c%d9%85%db%8c%d9%86%da%af-%d8%a8%d8%b1%d8%a7%db%8c-%d8%b4%d9%85%d8%a7-%d8%a7%d8%aa%d9%81%d8%a7%d9%82-%d8%a7%d9%81%d8%aa%d8%a7%d8%af-%da%86%d9%87-%d8%a8%d8%a7\">E\u011fer ba\u015f\u0131n\u0131za skimming gelirse ne yapmal\u0131s\u0131n\u0131z?<\/h2>\n<p>Kart kopyalama ma\u011fduru oldu\u011funuzdan \u015f\u00fcpheleniyorsan\u0131z, h\u0131zl\u0131 hareket etmeniz gerekir. Ola\u011fand\u0131\u015f\u0131 hareketler genellikle bankalar\u0131n g\u00fcvenlik sistemleri taraf\u0131ndan otomatik olarak tespit edilir, ancak sistemin tespit etmedi\u011fini d\u00fc\u015f\u00fcnd\u00fc\u011f\u00fcn\u00fcz \u015f\u00fcpheli bir hareket fark ederseniz, bankan\u0131z\u0131 derhal bilgilendirmelisiniz. Bu, maddi zarar\u0131 en aza indirmeye ve her \u015feyin \u00e7\u00f6z\u00fclme olas\u0131l\u0131\u011f\u0131n\u0131 art\u0131rmaya yard\u0131mc\u0131 olabilir. Ayr\u0131ca, a\u015fa\u011f\u0131daki ad\u0131mlar\u0131 da izlemelisiniz:<\/p>\n<ul>\n<li>Kart\u0131n\u0131z\u0131 bloke edin: Bu ilk ve en \u00f6nemli ad\u0131md\u0131r. Kart\u0131n\u0131z\u0131 bloke ettirmek i\u00e7in derhal bankan\u0131zla veya kredi kart\u0131 \u015firketinizle ileti\u015fime ge\u00e7in. \u00c7o\u011fu banka bu ama\u00e7la 24 saat hizmet veren bir yard\u0131m hatt\u0131 sunar.<\/li>\n<li>Su\u00e7 duyurusunda bulunun: Kredi kart\u0131 doland\u0131r\u0131c\u0131l\u0131\u011f\u0131n\u0131 polise bildirin. Bu, savc\u0131l\u0131\u011f\u0131n failleri tespit etmesine ve yasal koruma alman\u0131za yard\u0131mc\u0131 olacakt\u0131r.<\/li>\n<li>\u015eifrelerinizi de\u011fi\u015ftirin: Ba\u015fka ki\u015fisel bilgilerinizin \u00e7al\u0131nd\u0131\u011f\u0131ndan \u015f\u00fcpheleniyorsan\u0131z, \u00f6zellikle internet bankac\u0131l\u0131\u011f\u0131 i\u00e7in kulland\u0131\u011f\u0131n\u0131z \u00f6nemli \u015fifreleri derhal de\u011fi\u015ftirmelisiniz. Daha iyi koruma i\u00e7in tek kullan\u0131ml\u0131k \u015fifre (OTP) kullanmak iyi bir fikirdir.<\/li>\n<li>\u00d6nleyici tedbirler al\u0131n: Gelecekteki kart kopyalama giri\u015fimlerini nas\u0131l \u00f6nleyebilece\u011finizi d\u00fc\u015f\u00fcn\u00fcn. Bu, temass\u0131z \u00f6deme y\u00f6ntemlerini kullanmak, ATM&#039;leri kullanmadan \u00f6nce d\u00fczenli olarak kontrol etmek veya i\u015flem uyar\u0131lar\u0131 ayarlamak anlam\u0131na gelebilir.<\/li>\n<\/ul>\n<h2 id=\"%d9%86%d8%aa%db%8c%d8%ac%d9%87\">Sonu\u00e7<\/h2>\n<p>Olay \u00e7\u00f6z\u00fclse bile, dikkatli olmal\u0131s\u0131n\u0131z. Kart kopyalama doland\u0131r\u0131c\u0131l\u0131klar\u0131, kimlik av\u0131 ve di\u011fer \u00e7evrimi\u00e7i doland\u0131r\u0131c\u0131l\u0131k t\u00fcrleri bunlardan sadece birka\u00e7\u0131d\u0131r. Daha dikkatli olmak, gelecekte para kaybetmenizi engelleyebilir.<\/p>","protected":false},"excerpt":{"rendered":"Giri\u015f Skimming, bir kart\u0131n manyetik \u015feridinden veya \u00e7ipinden gelen verilerin \u00e7al\u0131nd\u0131\u011f\u0131 bir t\u00fcr arac\u0131 sald\u0131r\u0131d\u0131r.","protected":false},"author":1,"featured_media":16130,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_yoast_wpseo_focuskw":"\u06a9\u0644\u0627\u0647\u0628\u0631\u062f\u0627\u0631\u06cc \u0627\u0633\u06a9\u06cc\u0645\u06cc\u0646\u06af \u0686\u06cc\u0633\u062a \u0648 \u0686\u06af\u0648\u0646\u0647 \u0627\u0632 \u062e\u0648\u062f \u0645\u062d\u0627\u0641\u0638\u062a \u06a9\u0646\u06cc\u062f","_yoast_wpseo_title":"","_yoast_wpseo_metadesc":"","_yoast_wpseo_canonical":"","_yoast_wpseo_opengraph-description":"","_yoast_wpseo_opengraph-image":"","_yoast_wpseo_twitter-description":"","_yoast_wpseo_twitter-image":"","_yoast_wpseo_focuskeywords":"","_yoast_wpseo_primary_category":"193","footnotes":""},"categories":[193,324],"tags":[404],"class_list":{"0":"post-16129","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-tutorials","8":"category-security","9":"tag-security"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>\u06a9\u0644\u0627\u0647\u0628\u0631\u062f\u0627\u0631\u06cc \u0627\u0633\u06a9\u06cc\u0645\u06cc\u0646\u06af \u0686\u06cc\u0633\u062a \u0648 \u0686\u06af\u0648\u0646\u0647 \u0627\u0632 \u062e\u0648\u062f \u0645\u062d\u0627\u0641\u0638\u062a \u06a9\u0646\u06cc\u062f - \u0628\u0644\u0627\u06af ITPiran<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.itpiran.net\/blog\/tr\/tutorials\/what-is-skimming-fraud-and-how-to-protect-yourself\/\" \/>\n<meta property=\"og:locale\" content=\"tr_TR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u06a9\u0644\u0627\u0647\u0628\u0631\u062f\u0627\u0631\u06cc \u0627\u0633\u06a9\u06cc\u0645\u06cc\u0646\u06af \u0686\u06cc\u0633\u062a \u0648 \u0686\u06af\u0648\u0646\u0647 \u0627\u0632 \u062e\u0648\u062f \u0645\u062d\u0627\u0641\u0638\u062a \u06a9\u0646\u06cc\u062f - \u0628\u0644\u0627\u06af ITPiran\" \/>\n<meta property=\"og:description\" content=\"\u0645\u0642\u062f\u0645\u0647 Skimming \u0646\u0648\u0639\u06cc \u062d\u0645\u0644\u0647 \u0627\u0646\u0633\u0627\u0646 \u062f\u0631 \u0648\u0633\u0637 \u0627\u0633\u062a \u06a9\u0647 \u062f\u0631 \u0622\u0646 \u062f\u0627\u062f\u0647\u200c\u0647\u0627\u06cc \u0646\u0648\u0627\u0631 \u0645\u063a\u0646\u0627\u0637\u06cc\u0633\u06cc \u06cc\u0627 \u062a\u0631\u0627\u0634\u0647 \u06cc\u06a9 \u06a9\u0627\u0631\u062a&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.itpiran.net\/blog\/tr\/tutorials\/what-is-skimming-fraud-and-how-to-protect-yourself\/\" \/>\n<meta property=\"og:site_name\" content=\"\u0628\u0644\u0627\u06af ITPiran\" \/>\n<meta property=\"article:published_time\" content=\"2024-09-11T08:32:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cdn.itpiran.net\/2024\/09\/11115443\/secContetnt1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1793\" \/>\n\t<meta property=\"og:image:height\" content=\"1110\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Yazan:\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.itpiran.net\\\/blog\\\/tutorials\\\/what-is-skimming-fraud-and-how-to-protect-yourself\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.itpiran.net\\\/blog\\\/tutorials\\\/what-is-skimming-fraud-and-how-to-protect-yourself\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/www.itpiran.net\\\/blog\\\/#\\\/schema\\\/person\\\/04ed27b919baca468a2273f8e4318f81\"},\"headline\":\"\u06a9\u0644\u0627\u0647\u0628\u0631\u062f\u0627\u0631\u06cc \u0627\u0633\u06a9\u06cc\u0645\u06cc\u0646\u06af \u0686\u06cc\u0633\u062a \u0648 \u0686\u06af\u0648\u0646\u0647 \u0627\u0632 \u062e\u0648\u062f \u0645\u062d\u0627\u0641\u0638\u062a \u06a9\u0646\u06cc\u062f\",\"datePublished\":\"2024-09-11T08:32:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.itpiran.net\\\/blog\\\/tutorials\\\/what-is-skimming-fraud-and-how-to-protect-yourself\\\/\"},\"wordCount\":8,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.itpiran.net\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.itpiran.net\\\/blog\\\/tutorials\\\/what-is-skimming-fraud-and-how-to-protect-yourself\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cdn.itpiran.net\\\/2024\\\/09\\\/11115443\\\/secContetnt1.jpg\",\"keywords\":[\"Security\"],\"articleSection\":[\"\u0622\u0645\u0648\u0632\u0634\u06cc\",\"\u0627\u0645\u0646\u06cc\u062a\"],\"inLanguage\":\"tr\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.itpiran.net\\\/blog\\\/tutorials\\\/what-is-skimming-fraud-and-how-to-protect-yourself\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.itpiran.net\\\/blog\\\/tutorials\\\/what-is-skimming-fraud-and-how-to-protect-yourself\\\/\",\"url\":\"https:\\\/\\\/www.itpiran.net\\\/blog\\\/tutorials\\\/what-is-skimming-fraud-and-how-to-protect-yourself\\\/\",\"name\":\"\u06a9\u0644\u0627\u0647\u0628\u0631\u062f\u0627\u0631\u06cc \u0627\u0633\u06a9\u06cc\u0645\u06cc\u0646\u06af \u0686\u06cc\u0633\u062a \u0648 \u0686\u06af\u0648\u0646\u0647 \u0627\u0632 \u062e\u0648\u062f \u0645\u062d\u0627\u0641\u0638\u062a \u06a9\u0646\u06cc\u062f - \u0628\u0644\u0627\u06af ITPiran\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.itpiran.net\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.itpiran.net\\\/blog\\\/tutorials\\\/what-is-skimming-fraud-and-how-to-protect-yourself\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.itpiran.net\\\/blog\\\/tutorials\\\/what-is-skimming-fraud-and-how-to-protect-yourself\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cdn.itpiran.net\\\/2024\\\/09\\\/11115443\\\/secContetnt1.jpg\",\"datePublished\":\"2024-09-11T08:32:39+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.itpiran.net\\\/blog\\\/tutorials\\\/what-is-skimming-fraud-and-how-to-protect-yourself\\\/#breadcrumb\"},\"inLanguage\":\"tr\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.itpiran.net\\\/blog\\\/tutorials\\\/what-is-skimming-fraud-and-how-to-protect-yourself\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"tr\",\"@id\":\"https:\\\/\\\/www.itpiran.net\\\/blog\\\/tutorials\\\/what-is-skimming-fraud-and-how-to-protect-yourself\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cdn.itpiran.net\\\/2024\\\/09\\\/11115443\\\/secContetnt1.jpg\",\"contentUrl\":\"https:\\\/\\\/cdn.itpiran.net\\\/2024\\\/09\\\/11115443\\\/secContetnt1.jpg\",\"width\":1793,\"height\":1110},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.itpiran.net\\\/blog\\\/tutorials\\\/what-is-skimming-fraud-and-how-to-protect-yourself\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.itpiran.net\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u0622\u0645\u0648\u0632\u0634\u06cc\",\"item\":\"https:\\\/\\\/www.itpiran.net\\\/blog\\\/category\\\/tutorials\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"\u06a9\u0644\u0627\u0647\u0628\u0631\u062f\u0627\u0631\u06cc \u0627\u0633\u06a9\u06cc\u0645\u06cc\u0646\u06af \u0686\u06cc\u0633\u062a \u0648 \u0686\u06af\u0648\u0646\u0647 \u0627\u0632 \u062e\u0648\u062f \u0645\u062d\u0627\u0641\u0638\u062a \u06a9\u0646\u06cc\u062f\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.itpiran.net\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.itpiran.net\\\/blog\\\/\",\"name\":\"\u0628\u0644\u0627\u06af ITPiran\",\"description\":\"\u0627\u062e\u0628\u0627\u0631 \u0648 \u0645\u0642\u0627\u0644\u0627\u062a \u062a\u062c\u0627\u0631\u062a \u067e\u0627\u06cc\u062f\u0627\u0631 \u0627\u06cc\u0631\u0627\u0646\u06cc\u0627\u0646\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.itpiran.net\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.itpiran.net\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"tr\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.itpiran.net\\\/blog\\\/#organization\",\"name\":\"\u0628\u0644\u0627\u06af \u062a\u062c\u0627\u0631\u062a \u067e\u0627\u06cc\u062f\u0627\u0631 \u0627\u06cc\u0631\u0627\u0646\u06cc\u0627\u0646\",\"alternateName\":\"ITPIran Blog\",\"url\":\"https:\\\/\\\/www.itpiran.net\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"tr\",\"@id\":\"https:\\\/\\\/www.itpiran.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cdn.itpiran.net\\\/2023\\\/12\\\/27150508\\\/cropped-ITPIRAN-BLOG-LOGO-2.png\",\"contentUrl\":\"https:\\\/\\\/cdn.itpiran.net\\\/2023\\\/12\\\/27150508\\\/cropped-ITPIRAN-BLOG-LOGO-2.png\",\"width\":512,\"height\":512,\"caption\":\"\u0628\u0644\u0627\u06af \u062a\u062c\u0627\u0631\u062a \u067e\u0627\u06cc\u062f\u0627\u0631 \u0627\u06cc\u0631\u0627\u0646\u06cc\u0627\u0646\"},\"image\":{\"@id\":\"https:\\\/\\\/www.itpiran.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.itpiran.net\\\/blog\\\/#\\\/schema\\\/person\\\/04ed27b919baca468a2273f8e4318f81\",\"name\":\"admin\",\"url\":\"https:\\\/\\\/www.itpiran.net\\\/blog\\\/tr\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Skimming Doland\u0131r\u0131c\u0131l\u0131\u011f\u0131 Nedir ve Kendinizi Nas\u0131l Koruyabilirsiniz? - ITPiran Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.itpiran.net\/blog\/tr\/tutorials\/what-is-skimming-fraud-and-how-to-protect-yourself\/","og_locale":"tr_TR","og_type":"article","og_title":"\u06a9\u0644\u0627\u0647\u0628\u0631\u062f\u0627\u0631\u06cc \u0627\u0633\u06a9\u06cc\u0645\u06cc\u0646\u06af \u0686\u06cc\u0633\u062a \u0648 \u0686\u06af\u0648\u0646\u0647 \u0627\u0632 \u062e\u0648\u062f \u0645\u062d\u0627\u0641\u0638\u062a \u06a9\u0646\u06cc\u062f - \u0628\u0644\u0627\u06af ITPiran","og_description":"\u0645\u0642\u062f\u0645\u0647 Skimming \u0646\u0648\u0639\u06cc \u062d\u0645\u0644\u0647 \u0627\u0646\u0633\u0627\u0646 \u062f\u0631 \u0648\u0633\u0637 \u0627\u0633\u062a \u06a9\u0647 \u062f\u0631 \u0622\u0646 \u062f\u0627\u062f\u0647\u200c\u0647\u0627\u06cc \u0646\u0648\u0627\u0631 \u0645\u063a\u0646\u0627\u0637\u06cc\u0633\u06cc \u06cc\u0627 \u062a\u0631\u0627\u0634\u0647 \u06cc\u06a9 \u06a9\u0627\u0631\u062a&hellip;","og_url":"https:\/\/www.itpiran.net\/blog\/tr\/tutorials\/what-is-skimming-fraud-and-how-to-protect-yourself\/","og_site_name":"\u0628\u0644\u0627\u06af ITPiran","article_published_time":"2024-09-11T08:32:39+00:00","og_image":[{"width":1793,"height":1110,"url":"https:\/\/cdn.itpiran.net\/2024\/09\/11115443\/secContetnt1.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Yazan:":"admin"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.itpiran.net\/blog\/tutorials\/what-is-skimming-fraud-and-how-to-protect-yourself\/#article","isPartOf":{"@id":"https:\/\/www.itpiran.net\/blog\/tutorials\/what-is-skimming-fraud-and-how-to-protect-yourself\/"},"author":{"name":"admin","@id":"https:\/\/www.itpiran.net\/blog\/#\/schema\/person\/04ed27b919baca468a2273f8e4318f81"},"headline":"\u06a9\u0644\u0627\u0647\u0628\u0631\u062f\u0627\u0631\u06cc \u0627\u0633\u06a9\u06cc\u0645\u06cc\u0646\u06af \u0686\u06cc\u0633\u062a \u0648 \u0686\u06af\u0648\u0646\u0647 \u0627\u0632 \u062e\u0648\u062f \u0645\u062d\u0627\u0641\u0638\u062a \u06a9\u0646\u06cc\u062f","datePublished":"2024-09-11T08:32:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.itpiran.net\/blog\/tutorials\/what-is-skimming-fraud-and-how-to-protect-yourself\/"},"wordCount":8,"commentCount":0,"publisher":{"@id":"https:\/\/www.itpiran.net\/blog\/#organization"},"image":{"@id":"https:\/\/www.itpiran.net\/blog\/tutorials\/what-is-skimming-fraud-and-how-to-protect-yourself\/#primaryimage"},"thumbnailUrl":"https:\/\/cdn.itpiran.net\/2024\/09\/11115443\/secContetnt1.jpg","keywords":["Security"],"articleSection":["\u0622\u0645\u0648\u0632\u0634\u06cc","\u0627\u0645\u0646\u06cc\u062a"],"inLanguage":"tr","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.itpiran.net\/blog\/tutorials\/what-is-skimming-fraud-and-how-to-protect-yourself\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.itpiran.net\/blog\/tutorials\/what-is-skimming-fraud-and-how-to-protect-yourself\/","url":"https:\/\/www.itpiran.net\/blog\/tutorials\/what-is-skimming-fraud-and-how-to-protect-yourself\/","name":"Skimming Doland\u0131r\u0131c\u0131l\u0131\u011f\u0131 Nedir ve Kendinizi Nas\u0131l Koruyabilirsiniz? - ITPiran Blog","isPartOf":{"@id":"https:\/\/www.itpiran.net\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.itpiran.net\/blog\/tutorials\/what-is-skimming-fraud-and-how-to-protect-yourself\/#primaryimage"},"image":{"@id":"https:\/\/www.itpiran.net\/blog\/tutorials\/what-is-skimming-fraud-and-how-to-protect-yourself\/#primaryimage"},"thumbnailUrl":"https:\/\/cdn.itpiran.net\/2024\/09\/11115443\/secContetnt1.jpg","datePublished":"2024-09-11T08:32:39+00:00","breadcrumb":{"@id":"https:\/\/www.itpiran.net\/blog\/tutorials\/what-is-skimming-fraud-and-how-to-protect-yourself\/#breadcrumb"},"inLanguage":"tr","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.itpiran.net\/blog\/tutorials\/what-is-skimming-fraud-and-how-to-protect-yourself\/"]}]},{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/www.itpiran.net\/blog\/tutorials\/what-is-skimming-fraud-and-how-to-protect-yourself\/#primaryimage","url":"https:\/\/cdn.itpiran.net\/2024\/09\/11115443\/secContetnt1.jpg","contentUrl":"https:\/\/cdn.itpiran.net\/2024\/09\/11115443\/secContetnt1.jpg","width":1793,"height":1110},{"@type":"BreadcrumbList","@id":"https:\/\/www.itpiran.net\/blog\/tutorials\/what-is-skimming-fraud-and-how-to-protect-yourself\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.itpiran.net\/blog\/"},{"@type":"ListItem","position":2,"name":"\u0622\u0645\u0648\u0632\u0634\u06cc","item":"https:\/\/www.itpiran.net\/blog\/category\/tutorials\/"},{"@type":"ListItem","position":3,"name":"\u06a9\u0644\u0627\u0647\u0628\u0631\u062f\u0627\u0631\u06cc \u0627\u0633\u06a9\u06cc\u0645\u06cc\u0646\u06af \u0686\u06cc\u0633\u062a \u0648 \u0686\u06af\u0648\u0646\u0647 \u0627\u0632 \u062e\u0648\u062f \u0645\u062d\u0627\u0641\u0638\u062a \u06a9\u0646\u06cc\u062f"}]},{"@type":"WebSite","@id":"https:\/\/www.itpiran.net\/blog\/#website","url":"https:\/\/www.itpiran.net\/blog\/","name":"ITPiran Blog","description":"\u0130ran S\u00fcrd\u00fcr\u00fclebilir Ticaret Haberleri ve Makaleleri","publisher":{"@id":"https:\/\/www.itpiran.net\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.itpiran.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"tr"},{"@type":"Organization","@id":"https:\/\/www.itpiran.net\/blog\/#organization","name":"S\u00fcrd\u00fcr\u00fclebilir \u0130ran \u0130\u015fletmeleri Blogu","alternateName":"ITPIran Blog","url":"https:\/\/www.itpiran.net\/blog\/","logo":{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/www.itpiran.net\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cdn.itpiran.net\/2023\/12\/27150508\/cropped-ITPIRAN-BLOG-LOGO-2.png","contentUrl":"https:\/\/cdn.itpiran.net\/2023\/12\/27150508\/cropped-ITPIRAN-BLOG-LOGO-2.png","width":512,"height":512,"caption":"\u0628\u0644\u0627\u06af \u062a\u062c\u0627\u0631\u062a \u067e\u0627\u06cc\u062f\u0627\u0631 \u0627\u06cc\u0631\u0627\u0646\u06cc\u0627\u0646"},"image":{"@id":"https:\/\/www.itpiran.net\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.itpiran.net\/blog\/#\/schema\/person\/04ed27b919baca468a2273f8e4318f81","name":"y\u00f6netici","url":"https:\/\/www.itpiran.net\/blog\/tr\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.itpiran.net\/blog\/tr\/wp-json\/wp\/v2\/posts\/16129","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.itpiran.net\/blog\/tr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.itpiran.net\/blog\/tr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.itpiran.net\/blog\/tr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.itpiran.net\/blog\/tr\/wp-json\/wp\/v2\/comments?post=16129"}],"version-history":[{"count":2,"href":"https:\/\/www.itpiran.net\/blog\/tr\/wp-json\/wp\/v2\/posts\/16129\/revisions"}],"predecessor-version":[{"id":16132,"href":"https:\/\/www.itpiran.net\/blog\/tr\/wp-json\/wp\/v2\/posts\/16129\/revisions\/16132"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.itpiran.net\/blog\/tr\/wp-json\/wp\/v2\/media\/16130"}],"wp:attachment":[{"href":"https:\/\/www.itpiran.net\/blog\/tr\/wp-json\/wp\/v2\/media?parent=16129"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.itpiran.net\/blog\/tr\/wp-json\/wp\/v2\/categories?post=16129"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.itpiran.net\/blog\/tr\/wp-json\/wp\/v2\/tags?post=16129"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}