Could you be affected by diversion theft?

Could you be affected by diversion theft?

Diversion theft started as an “offline” attack where the mal-actor tricks a courier into picking up or dropping off a package from the wrong location and hence either facilitating the delivery of their false package or accessing the real package. It’s also known as the “Corner game” or “Round the corner game” and has its origins in the East End of London, way before the Internet was even thought of.

A lorry driver would be met and told that the goods he is carrying are needed around the corner from the real drop off point. The goods are then easily accessible by the crooks and can be stolen or substituted.

Nick Dance

Legionella Risk services and Water Sampling to help you comply with H&S Law. Yorkshire based with Yorkshire prices.

4 年

It is certainly worth talking to Trevor, there are so many threats out there. He will help you identify the vulnerable areas in your business.

回复

要查看或添加评论,请登录

★ Trevor Wood ★的更多文章

  • 7 ways to improve your cybersecurity for 2022

    7 ways to improve your cybersecurity for 2022

    Over the last year we have seen a massive increase in hacking attempts on micro, small and medium-sized businesses, and…

    1 条评论
  • GoDaddy, 123Reg hacked

    GoDaddy, 123Reg hacked

    On 22nd November 2021, GoDaddy disclosed that an unknown attacker had gained unauthorized access to the system used to…

    1 条评论
  • Facebook: how you really get hacked

    Facebook: how you really get hacked

    How people think they get hacked How they really get hacked I’ve seen loads of these types of questions on Facebook and…

  • Tips for keeping your password safe and secure

    Tips for keeping your password safe and secure

    We have loads of website we log in to these days – I have somewhere around a thousand. That’s a thousand possible…

  • Social Engineering: What is tailgating?

    Social Engineering: What is tailgating?

    What is tailgating? Tailgating (also known as piggybacking) is one of the commonest ways hackers and other mal-actors…

  • 10 keys to improve your cyber resilience

    10 keys to improve your cyber resilience

    Over the last year, more and more of us have been working from home due to the Covid-19 pandemic. With working from…

  • Social Engineering: What is quid pro quo?

    Social Engineering: What is quid pro quo?

    Quid pro quo is a Latin phrase that literally means “something for something,” or “this for that.” We use it to signify…

  • Cybersecurity: What is a honey trap?

    Cybersecurity: What is a honey trap?

    What is a honey trap? A honey trap is probably best known from the world of espionage and politics, where a person…

  • 10 reasons to use a cloud backup service

    10 reasons to use a cloud backup service

    Ease of use – the simple set and forget features of the software mean that you simply choose what you want backed up…

  • What is malware?

    What is malware?

    Malware is the collective name for several different types of malicious software that are harmful to a computer user…

社区洞察

其他会员也浏览了