Although fraud is referred to as the act of defrauding in the dictionary, it gains meaning as a form of gaining a certain benefit in the act of deliberate deception.

The history of this business or action dates back to ancient times. Numerous methods and methods of this action, which is seen as a way of breaking away from the environment of justice, have been in the literature until today. With the advancement of communication and technology, this form of action opened up different areas for itself and new methods emerged. There are an incredible number of fraudulent methods today. There are names around the world who consider this act of action as business, as well as in our country there are names that have become famous for their scams.i Pheasant Osman, who has even been the subject of Kemal Sunal films, was nicknamed Tosuncuk, who became famous for the Çiftlik Bank scandal. Mehmet Aydin or Thodex cryptocurrency exchange hit Faruk Fatih Ozer.

For older generations, mail or telephone, e-mail for those born in the 80s, SMS for those born in the 90s, and social media for those born in the 2000s can be considered as the main means of communication.ii

Email scam methods

Spam/unwanted e-mails have also entered our lives with e-mail. Some of the fraudulent emails that can bypass spam protections can also end up in our inbox and take us by surprise.iii Sometimes an email from your bank, sometimes a very rich nameivSometimes, they can pretend to be police, prosecutors, lawyers.v You may be asked to enter your username, password or card information by being directed to fake sites that are similar to real Sometimes you will be sent a high cost fake invoice and be asked to open the attached file or install the infected/modified application.vii

There are many ways to recognize fake email.viii The most obvious of these methods is that the e-mail is not written on your behalf. The links in these emails ask you to enter or update your personal information. They may contain unsafe file attachments. They ask you to log in with your confidential information (Name, Surname, TR Identity Number, credit card password, etc.) to an unsafe fake site.

What to know

  • The origin of the e-mails should be carefully checked. Email from a source we don't want or expect should definitely be ignored.
  • While the incoming address looks secure, the reply-to address may be different. In this case, no answer should be given.
  • E-mails, file attachments, links from unsafe sources should not be opened.
  • Emails that have fallen into the spam box should never be opened unless the source is trusted.
  • Never reply to spam emails. Some spam emails may even contain a link to unsubscribe.ix

Social media scam methods

You may come across advertisements or posts like I invested money in X company on social media, earn many times more in 3 hours. I'm revealing the secret that everyone knows: It's all lies!

The operation is usually copyright infringement that the victim received from an account they don't know.xStarts with a message that claims you've won a gift or made a lot of money. When the victim clicks on the link sent, he is asked to enter his account information on the fake site.xi The information entered on the fake site is used by the attackers, and your account is seized, and fake images, fake bank receipts etc. are shared, giving the impression that you make a lot of money by depositing money to a company that shows your name, picture and does not exist. When your environment sends money to the fraudsters, the fraudsters reach their goal. If your account is hacked, you have to file a criminal complaint with the police station and prosecutor's office.

There are a wide variety of scams that can happen to you on social media. The person you think you have found the love you are looking for may be a scammer! You may be told that you have won a lottery or a prize and must pay a small tax or fee for it.xii Another fraud method encountered on social media is aid campaigns with so-called governor's permission collected for sick people. If you want to help, start with your closest friend or choose to help well-known institutions such as Kızılay.

What to know

  • Do not fill in your username, password and any personal information except on the site's own original login page or application.
  • Think carefully when clicking on incoming links, even those you know. Never click on private messages or links from people you don't know.
  • You've won what sounds good, forget about specials, discounts, etc., don't believe any of them.
  • Never send or send money to anyone (even your acquaintances) who asks for money on social media. Even if you know the account, it may have been hacked.

Phone or SMS fraud methods

Right now, prosecutors, police and judges are calling us intensely! In most of them, we associate our name with terrorist organizations (FETO, PKK, DAESH, etc.), whose name should never be mentioned, and ask you to deliver the money in our account, your gold in the house and all the money.xiii. They may even offer identification on this matter.xiv We can even give up all our assets so that our name, our business, our children's lives are not tarnished. So, is the person calling you really the police, the prosecutor, or the person he claims to be? Seriously, is your name involved in these crimes? Most importantly, is the calling number real?

Another negative feature of smartphones is that they can hide the caller's number itself, making it appear as if they are calling you from 155 police lines or from your bank's account number, with legal or illegal applications.xv

Phone scammers can use sites that provide VoIP (a technology for making voice calls over the Internet) services abroad or in the country. Sometimes they may be working as a call center or as a group.xvi

What to know

  • Try not to answer calls from unknown or unknown numbers!
  • If the caller asks you to press a key, never press it!
  • Never answer questions that ask for or concern your personal information!
  • Never accept that they are who they say they are. Police, prosecutor or bank, it doesn't matter.
  • Don't panic! Because in a panic, a person cannot make the right decision.
  • Never forward text messages sent to your account to the other party!
  • Never click on links in a text message.

Fraud methods

Website scams

Unfortunately, there is no definitive method of knowing which website is safe and which is not. However, some signs can help you determine whether the site on the other end is safe.

What to know

Secure sites generally use SSL. If a site that contains a login form or requires you to enter your credit card information does not use SSL, try to stay away from that site. If it is a product you are looking for, search for its existence in alternative and more well-known sources and try to buy it from there.xvii

Stay away from matrimonial sites and applications that exist for this purpose! Such sites do not care about personal data and often share personal data with other sites in their networks. In addition, romantic fraud methods are very common on such sites.xviii

Don't be surprised by the sites you know, know and shop from before. Do not forget to use a virtual credit card while shopping. When shopping on well-known multi-vendor sites, pay close attention to the identity of the seller, shopping history, and product features alongside the site. No one sells the product they have for nothing, far below the price.

General precautions

Do not shop at places such as cafes that offer free Wi-Fi service. If you need to shop, delay until you find a safe internet.nineteenth

Create a separate and random password for each site or use existing software for it.

Do not allow sites to save your credit card information.

Don't forget to enable double-factor authentication on your social media and email accounts.


Some of the links in the resources I provide are in Turkish, unfortunately most of them are in English. Don't forget to browse, read or watch them too.

i Argonomics, we have been deceived, my people.

ii The classification has no scientific basis. I just wanted to emphasize the generation gap.

iii All About Phishing Scams & Prevention: What You Need to Know:

iv African scammers – Mail scam:

v 9 Examples of Common Phishing Emails:

vi Online scam Top 5 spam tricks:

vii E-Mail Fraud Methods and Measures to be Taken:

viii 7 Ways to Recognize a Phishing Email:

ix How to stop spam emails – Tips and Advice:

x Instagram accounts are hacked with fake copyright infringement notices

xi Social media scam news:

xii For more, see:

xiii I lured those who deceive old people:

xiv They Called Haber33 team with fake police ID:

xv Caller ID Spoofing:

xvi Everything to Know About Phone Number Spoofing:

xvii What Are Scam Websites and How To Avoid Scam Websites:

xviii Online Dating Scams and Avoiding Them:

nineteenth How to Avoid Online Shopping Scams: 5 Safe Online Shopping Tips