Card Skimming

(card skim’ming) (n.) The act of using a skimmer to illegally collect data from the magnetic stripe of a credit, debit or ATM card. This information, copied onto another blank card’s magnetic stripe, is then used by an identity thief to make purchases or withdraw cash in the name of the actual account holder.

Skimming works by replacing a card reader like an ATM with a camouflaged counterfeit card reader. The counterfeit reader records all of the data on a credit, debit or ATM card as it passes through the skimmer. In addition to ATMs, other locations where card skimming happens include restaurants, taxis or other businesses where an employee will take the card from the actual account holder in order to run the charge. In these instances, the thief has fitted the card reader with a skimmer, or uses a hand-held skimmer hidden in a pocket.

Also see “How to Protect Against Card Skimming” in the Did You Know…? section of Webopedia.

Vangie Beal
Vangie Beal
Vangie Beal is a freelance business and technology writer covering Internet technologies and online business since the late '90s.

Top Articles

List of Windows Operating System Versions & History [In Order]

The Windows operating system (Windows OS) refers to a family of operating systems developed by Microsoft Corporation. We look at the history of Windows...

How to Create a Website Shortcut on Your Desktop

Website Shortcut on Your Desktop reviewed by Web Webster   This Webopedia guide will show you how to create a website shortcut on your desktop using...

What are the Five Generations of Computers? (1st to 5th)

Reviewed by Web Webster Each generation of computer has brought significant advances in speed and power to computing tasks. Learn about each of the...

Hotmail [Outlook] Email Accounts

Launched in 1996, Hotmail was one of the first public webmail services that could be accessed from any web browser. At its peak in...

HighLevel CRM

HighLevel is a sales and marketing customer relationship management (CRM) solution designed by...

Unified Endpoint Management (UEM)

As enterprise networks become increasingly distributed with growing numbers of remote workers, unified...

Decision Intelligence

Decision intelligence combines business intelligence (BI) and artificial intelligence (AI) models to improve...