{"id":28294,"date":"2019-08-07T14:05:18","date_gmt":"2019-08-07T14:05:18","guid":{"rendered":"https:\/\/blog.trendmicro.com\/?p=543101"},"modified":"2019-08-07T14:05:18","modified_gmt":"2019-08-07T14:05:18","slug":"digital-skimmers-what-are-they-and-how-can-i-keep-my-card-details-safe-online","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/digital-skimmers-what-are-they-and-how-can-i-keep-my-card-details-safe-online\/","title":{"rendered":"Digital skimmers: What are they and how can I keep my card details safe online?"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"157\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/08\/men-with-laptops-300x157.png\" class=\"attachment-medium size-medium wp-post-image\" alt srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/08\/men-with-laptops-300x157.png 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/08\/men-with-laptops-768x402.png 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/08\/men-with-laptops-1024x536.png 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/08\/men-with-laptops-640x335.png 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/08\/men-with-laptops-900x471.png 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/08\/men-with-laptops-440x230.png 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/08\/men-with-laptops-380x199.png 380w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\"><\/p>\n<p>A few weeks ago, British Airways was hit by the largest ever regulatory fine of its kind, after global customers visiting its website had their card data stolen. The $228m penalty <a href=\"https:\/\/ico.org.uk\/about-the-ico\/news-and-events\/news-and-blogs\/2019\/07\/ico-announces-intention-to-fine-british-airways\/\">levied by the UK\u2019s privacy watchdog<\/a> reflects the seriousness of the attack and the carrier\u2019s failure to protect its customer\u2019s personal and financial information. However, this incident has repercussions way beyond the UK airline and its customers. It\u2019s part of a new wave of attacks designed to implant \u201cdigital skimming\u201d code on e-commerce sites, in order to siphon off your card details as they are entered in to pay for goods.<\/p>\n<p>Although tens of thousands of websites have been caught out in this way, there are things you can do to stay safe\u2014most notably by running Trend Micro Security. But first, here\u2019s more on what you need to know.<\/p>\n<p><strong>The story so far<\/strong><\/p>\n<p>Data breaches are so often in the news headlines today, that you could be forgiven for becoming a little desensitized. From retailers like <a href=\"https:\/\/www.bankinfosecurity.com\/target-breach-what-happened-a-6312\">Target<\/a> and <a href=\"https:\/\/www.csoonline.com\/article\/2604320\/what-you-need-to-know-about-the-home-depot-data-breach.html\">Home Depot<\/a> to government breaches at agencies including the <a href=\"https:\/\/www.csoonline.com\/article\/3318238\/the-opm-hack-explained-bad-security-practices-meet-chinas-captain-america.html\">Office of Personnel Management<\/a> (OPM), and from financial organizations like <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/equifax-has-spent-nearly-14bn-on-1\/\">Equifax<\/a> to tech giants like <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/yahoos-2013-breach-triples-3\/\">Yahoo<\/a>, billions of our personal records have been stolen by cyber-thieves over the past few years.<\/p>\n<p>Yet in all of these cases, there has been little the customer could do about it. That\u2019s because the hackers target the organization directly. They find ways to bypass its security controls and sneak inside the company networks to find what they\u2019re looking for: usually databases full of customer data.<\/p>\n<p><strong>A new type of data breach<\/strong><\/p>\n<p>However, these new digital skimming attacks are different. In what way? They involve a hacker deploying malicious code known as Magecart to an organization\u2019s website. This code is typically designed to stay hidden, under the radar of the company. And it has a very specific purpose: to steal customer card details as they are entered into the site during payment. In short, it\u2019s the digital equivalent of those physical skimming devices that criminals insert into ATMs to steal card data as it\u2019s entered: it\u2019s highly effective and happens completely without the knowledge of the cardholder.<br \/>By using this method, the hackers get access to the full card details, which have a higher resale value on the cybercrime black market. The problem (for them) with the more traditional types of attack targeting back-end databases, is that these organizations may store card data encrypted, or else minus the crucial CVV\/CV2 code. Magecart attacks get around that.<\/p>\n<p><strong>What sites are at risk?<\/strong><\/p>\n<p>Indeed, the Magecart attackers have proven over the past year that no website is safe from skimming attacks. Whether it\u2019s a big-name e-commerce brand like <a href=\"https:\/\/threatpost.com\/magecart-strikes-again-siphoning-payment-info-from-newegg\/137576\/\">Newegg<\/a>, a national airline, a global ticketing site (<a href=\"https:\/\/www.securityweek.com\/ticketmaster-breach-tip-iceberg-major-ongoing-magecart-attacks\">Ticketmaster<\/a>), or <a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/mirrorthief-group-uses-magecart-skimming-attack-to-hit-hundreds-of-campus-online-stores-in-us-and-canada\/\">even online campus stores<\/a> serving nearly 200 universities in the US and Canada\u2013as long as they accept online payments, they\u2019re at risk.<br \/>Magecart is so effective that multiple groups are said to be using the code, a piece of malicious JavaScript, to infect websites around the world. And they\u2019re developing new tools and tactics all the time to improve their monetization. These include:<\/p>\n<table>\n<tbody readability=\"5.0568031704095\">\n<tr readability=\"10.113606340819\">\n<td width=\"20px\"><\/td>\n<td>\u2022 Infecting third-party companies which supply code to other sites (e.g., those that <a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/new-magecart-attack-delivered-through-compromised-advertising-supply-chain\/\">provide online ad services<\/a>). Thus, with just one attack, the hackers can get their Magecart code onto potentially thousands of payment pages.<br \/>\u2022 <a href=\"https:\/\/www.zdnet.com\/article\/new-magecart-attacks-leverage-misconfigured-s3-buckets-to-infect-over-17k-sites\/\">Using automated tools<\/a> to scan the internet for companies that may be running unsecured servers, which they can then infect with Magecart. Some 17,000 sites were recently compromised in this way. In a separate attack, <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/automated-magecart-campaign-hits-over-960-breached-stores\/\">962 online stores were hit in just 24 hours<\/a>.<br \/>\u2022 Developing new skimming code which is usable across as many different payment pages as possible. The record is <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/polymorphic-magecart-skimmer-uses-over-fifty-payment-gateways\/\">57 different payment gateways<\/a>, which makes the hackers\u2019 job much easier as they can launch attack campaigns across the globe with the same tools.<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>All this is bad news for online shoppers. So how do you know that the site you\u2019re entering card data into is safe?<\/p>\n<p><strong>What can you do to stay safe?<\/strong><\/p>\n<p>Unfortunately, there\u2019s nothing obvious that differentiates a website infected with Magecart from any other site. It will look completely normal and will allow you to pay in the usual manner. The only difference is that, in the background, a tiny piece of code will be stealing your data and transferring it to the hackers. So what can you do to protect yourself?<\/p>\n<table>\n<tbody readability=\"4.9598796389168\">\n<tr readability=\"9.9197592778335\">\n<td width=\"20px\"><\/td>\n<td>\u2022 You could try to avoid smaller sites that may not have the same level of security as larger ones. However, as we\u2019ve seen, Magecart has hit big-name brands as well as less well-known companies.<br \/>\u2022 Another option would be to use a browser plug-in like <a href=\"https:\/\/addons.mozilla.org\/en-US\/firefox\/addon\/noscript\/\">NoScript<\/a> for Firefox that prevents JavaScript loading from other untrusted sites \u2013 although this won\u2019t prevent you getting potentially stung if the well-known and trusted site you\u2019re on is compromised.<br \/>\u2022 Payment systems like Apple Pay and Google Pay can offer more protection. They use a one-time generated series of numbers for each transaction, so that if attackers get their hands on it, they won\u2019t be able to use it in the future.<br \/>\u2022 It goes without saying that you should keep a close eye on your card statements\/bank account at all times \u2013 watching out even for small amounts that hackers may be making to test if your card is still active.<br \/>\u2022 However, the most effective way to stay safe is to use Trend Micro Security.<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>How Trend Micro can help<\/strong><\/p>\n<p>Trend Micro Security features two key mechanisms to help stop Magecart attacks:<\/p>\n<table>\n<tbody readability=\"3.5\">\n<tr readability=\"7\">\n<td width=\"20px\"><\/td>\n<td>\u2022 It can detect whether the website you want to visit has been injected with skimming code, and block you from visiting the URL (via web reputation), as well as from going to malicious domains the skimming code has access to.<br \/>\u2022 It uses a combination of techniques (via its Advanced Threat Scanning Engine and TrendX-File machine learning) to detect whether the malicious JavaScript code has landed on your local drive and is ready to run in your browser \u2013 and then blocks it. This can spot both Magecart and similar digital skimming code.<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Read our Security Intelligence Blog for more technical details on <a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/new-magecart-attack-delivered-through-compromised-advertising-supply-chain\/?utm_source=feedburner&amp;utm_medium=email&amp;utm_campaign=Feed%3A+Anti-MalwareBlog+%28Trendlabs+Security+Intelligence+Blog%29\">Magecart<\/a>. Then go to our <a href=\"https:\/\/www.trendmicro.com\/en_us\/forHome\/products.html\">Security Products Overview<\/a> to get Trend Micro Security.<\/p>\n<p> Read More <a href=\"https:\/\/blog.trendmicro.com\/digital-skimmers-what-are-they-and-how-can-i-keep-my-card-details-safe-online\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A few weeks ago, British Airways was hit by the largest ever regulatory fine of its kind, after global customers visiting its website had their card data stolen. The $228m penalty levied by the UK\u2019s privacy watchdog reflects the seriousness of the attack and the carrier\u2019s failure to protect its customer\u2019s personal and financial information&#8230;.<br \/>\nThe post Digital skimmers: What are they and how can I keep my card details safe online? appeared first on . Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":28295,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[390,307],"class_list":["post-28294","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-consumer","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Digital skimmers: What are they and how can I keep my card details safe online? 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/digital-skimmers-what-are-they-and-how-can-i-keep-my-card-details-safe-online\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Digital skimmers: What are they and how can I keep my card details safe online? 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/digital-skimmers-what-are-they-and-how-can-i-keep-my-card-details-safe-online\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-08-07T14:05:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/digital-skimmers-what-are-they-and-how-can-i-keep-my-card-details-safe-online.png\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"157\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/digital-skimmers-what-are-they-and-how-can-i-keep-my-card-details-safe-online\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/digital-skimmers-what-are-they-and-how-can-i-keep-my-card-details-safe-online\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Digital skimmers: What are they and how can I keep my card details safe online?\",\"datePublished\":\"2019-08-07T14:05:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/digital-skimmers-what-are-they-and-how-can-i-keep-my-card-details-safe-online\/\"},\"wordCount\":1070,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/digital-skimmers-what-are-they-and-how-can-i-keep-my-card-details-safe-online\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/digital-skimmers-what-are-they-and-how-can-i-keep-my-card-details-safe-online.png\",\"keywords\":[\"Consumer\",\"Security\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/digital-skimmers-what-are-they-and-how-can-i-keep-my-card-details-safe-online\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/digital-skimmers-what-are-they-and-how-can-i-keep-my-card-details-safe-online\/\",\"name\":\"Digital skimmers: What are they and how can I keep my card details safe online? 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/digital-skimmers-what-are-they-and-how-can-i-keep-my-card-details-safe-online\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/digital-skimmers-what-are-they-and-how-can-i-keep-my-card-details-safe-online\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/digital-skimmers-what-are-they-and-how-can-i-keep-my-card-details-safe-online.png\",\"datePublished\":\"2019-08-07T14:05:18+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/digital-skimmers-what-are-they-and-how-can-i-keep-my-card-details-safe-online\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/digital-skimmers-what-are-they-and-how-can-i-keep-my-card-details-safe-online\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/digital-skimmers-what-are-they-and-how-can-i-keep-my-card-details-safe-online\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/digital-skimmers-what-are-they-and-how-can-i-keep-my-card-details-safe-online.png\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/digital-skimmers-what-are-they-and-how-can-i-keep-my-card-details-safe-online.png\",\"width\":300,\"height\":157},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/digital-skimmers-what-are-they-and-how-can-i-keep-my-card-details-safe-online\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Consumer\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/consumer\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Digital skimmers: What are they and how can I keep my card details safe online?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Digital skimmers: What are they and how can I keep my card details safe online? 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/digital-skimmers-what-are-they-and-how-can-i-keep-my-card-details-safe-online\/","og_locale":"en_US","og_type":"article","og_title":"Digital skimmers: What are they and how can I keep my card details safe online? 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/digital-skimmers-what-are-they-and-how-can-i-keep-my-card-details-safe-online\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-08-07T14:05:18+00:00","og_image":[{"width":300,"height":157,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/digital-skimmers-what-are-they-and-how-can-i-keep-my-card-details-safe-online.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/digital-skimmers-what-are-they-and-how-can-i-keep-my-card-details-safe-online\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/digital-skimmers-what-are-they-and-how-can-i-keep-my-card-details-safe-online\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Digital skimmers: What are they and how can I keep my card details safe online?","datePublished":"2019-08-07T14:05:18+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/digital-skimmers-what-are-they-and-how-can-i-keep-my-card-details-safe-online\/"},"wordCount":1070,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/digital-skimmers-what-are-they-and-how-can-i-keep-my-card-details-safe-online\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/digital-skimmers-what-are-they-and-how-can-i-keep-my-card-details-safe-online.png","keywords":["Consumer","Security"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/digital-skimmers-what-are-they-and-how-can-i-keep-my-card-details-safe-online\/","url":"https:\/\/www.threatshub.org\/blog\/digital-skimmers-what-are-they-and-how-can-i-keep-my-card-details-safe-online\/","name":"Digital skimmers: What are they and how can I keep my card details safe online? 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/digital-skimmers-what-are-they-and-how-can-i-keep-my-card-details-safe-online\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/digital-skimmers-what-are-they-and-how-can-i-keep-my-card-details-safe-online\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/digital-skimmers-what-are-they-and-how-can-i-keep-my-card-details-safe-online.png","datePublished":"2019-08-07T14:05:18+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/digital-skimmers-what-are-they-and-how-can-i-keep-my-card-details-safe-online\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/digital-skimmers-what-are-they-and-how-can-i-keep-my-card-details-safe-online\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/digital-skimmers-what-are-they-and-how-can-i-keep-my-card-details-safe-online\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/digital-skimmers-what-are-they-and-how-can-i-keep-my-card-details-safe-online.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/digital-skimmers-what-are-they-and-how-can-i-keep-my-card-details-safe-online.png","width":300,"height":157},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/digital-skimmers-what-are-they-and-how-can-i-keep-my-card-details-safe-online\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Consumer","item":"https:\/\/www.threatshub.org\/blog\/tag\/consumer\/"},{"@type":"ListItem","position":3,"name":"Digital skimmers: What are they and how can I keep my card details safe online?"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/28294","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=28294"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/28294\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/28295"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=28294"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=28294"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=28294"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}