wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

What is a Dumpster Diving Attack?

profile
Shifa Khan
Sep 20, 2022
2 Likes
0 Discussions
271 Reads

A dumpster diving attack is a type of cyber attack made possible by searching through the victim’s trash. While you might be imagining a messy and filthy scenario where a person dives into a dumpster, the reality is less unsanitary. In a dumpster diving attack, threat actors could be in and out of the dumpster in a matter of minutes. But they may already have their hands on a box full of confidential documents, storage devices, and workstations.

 

What Data Can Dumpster Drivers Obtain?

You would be surprised at the amount of information about you, your life, or your company in your trash. Think about the last time you threw your credit card statement. Did you shred it? How about the medical laboratory result from your previous visit to the doctor?

Among the data that dumpster drivers can get from searching through your trash are:

  1. Phone numbers of family members, friends, customers, and business associates
  2. Access codes and passwords written on an innocent notepad
  3. Credit card and bank account numbers
  4. Blueprints of product designs
  5. Printed drafts of business plans
  6. Calendars and to-do lists for previous days
  7. CDs, DVDs, and other portable storage devices

Any of the above information can be used to gain access to your home or work network. Notepads that contain passwords and access codes are the most valuable. However, most of us have learned to discard these items without a thought for security.

 

How to Protect Yourself from Dumpster Diving Attacks

The success of dumpster diving attacks can be traced back to lack of security knowledge. If people knew how an attacker could use the data on a piece of paper, they wouldn’t throw it without shredding.

Therefore, the most effective way to protect yourself and your organization from dumpster diving attacks is education. Learn to distinguish between confidential and public records.

For organizations, including disposal management in your overall security policy could provide clear guidelines on how sensitive data from your trash can stay protected. For example, the policy may dictate that all papers should be shredded before disposal. Storage devices, on the other hand, have to be cleaned of all data.


Comments ()


Sign in

Read Next

USPS mail

Blog banner

My Favorite Country

Blog banner

WHAT IS TWITTER AND HOW DOES IT WORK

Blog banner

E-mail security

Blog banner

IoT Architecture Based Security

Blog banner

How to Conquer Depression ?

Blog banner

How to setup a professional looking business account on Instagram?

Blog banner

Social media

Blog banner

Child labour

Blog banner

PROCESS STATES OF OPERATING SYSTEM

Blog banner

Bulk E-mail software

Blog banner

Know your Processors!

Blog banner

Tools to support CSI activities

Blog banner

How To Implement Search Engine Marketing (Sem) Strategy Effectively

Blog banner

Types of Threads

Blog banner

Outlook.com

Blog banner

Tomato Butter Sauce with Bucatini

Blog banner

Instagram Features in 2023 That Will Leave You Stunned!

Blog banner

The Rich Heritage Of Patola Sarees: Gujarat’s Timeless Weaving Art

Blog banner

Stop Racism

Blog banner

Study of Backdoor and Trojan tools

Blog banner

Deadlock and Starvation

Blog banner

10 Reasons why Monica and Chandler are the best couple ever.!!!

Blog banner

Blockchain Security Technique

Blog banner

5 ways to save money on catering services in Mumbai

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Direct Memory Access

Blog banner

What is Network Security?

Blog banner

Health is Wealth

Blog banner

Top 4 Places To Stay In Copenhagen

Blog banner

Basic Security For SOAP Services

Blog banner

Decoding the Weave — How to Identify Original Patola Art on a Fabric

Blog banner

Why Extreme Opinions Are Rising: Psychological Insights into Society’s Divides

Blog banner

Cache memory

Blog banner

Facebook marketing

Blog banner

Pipedrive

Blog banner

Networking 101: How to Build Meaningful Connections in College

Blog banner

How College Events Build Real-world Skills You Can’t Learn From Textbooks

Blog banner

The House ??of Patola Designs: Traditional Weaves with a Modern Twist

Blog banner

CYBERPEACEKEEPING: NEW WAYS TO PREVENT AND MANAGE CYBERATTACKS

Blog banner

What are NFT s?

Blog banner

What is Virtual Memory

Blog banner