IBM X-Force Red has revealed a new technique to get past filters, firewalls and other data protection devices.  It is called Warshipping.

What happens is that the fraudster delivers a package or envelope to the victim's reception desk.  The envelope contains a tiny remote-controlled modem and transmitter which can be activated by the fraudster remotely.  These devices are low power and almost undetectable.

They can use methods to enter your computer systems through wireless connectivity or other means and thereby gain access to your data.

You must prepare protocols in order that any unsolicited mail and/or packages are screened for such devices.

The content of this article is intended to provide a general guide to the subject matter. Specialist advice should be sought about your specific circumstances.