The Latest in IT Security

Second-Hand Smartphones Are a Trove of Personal Information

09
Jul
2014

Many mobile device users rely on simply deleting the private information on the storage card of the phone before selling it, in order to ensure that sensitive details are not passed to the new owner. However, items are stored persistently, and unless they are corrupted through overwrite action, they can be recovered. Avast carried out an experiment with 20 Android phones purchased through eBay, and then tried to find out how much of the deleted information could be retrieved. The results sho…

Comments are closed.

Categories

FRIDAY, APRIL 26, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments