Risks of selling used smartphones
Posted on 08 July 2014.
AVAST Software easily retrieved personal data from used smartphones sold online, despite consumers deleting their data. From the used devices, researchers was able to recover more than 40,000 personal photos, emails, text messages, and – in some cases – the identities of the sellers.

“The amount of personal data we retrieved from the phones was astounding. We found everything from a filled-out loan form to more than 250 selfies of what appear to be the previous owner's manhood,” said Jude McColgan, President of Mobile at AVAST.

“We purchased a variety of Android devices from sellers across the U.S. and used readily available recovery software to dig up personal information that was previously on the phones. The take-away is that even deleted data on your used phone can be recovered unless you completely overwrite it,” added McColgan.

AVAST analyzed 20 used smartphones whose previous owners had performed a factory reset or a “delete all” operation on their devices. Despite these efforts, AVAST was able to recover the following personal information:
  • More than 40,000 stored photos
  • More than 1,500 family photos of children
  • More than 750 photos of women in various stages of undress
  • More than 250 selfies of what appear to be the previous owner's manhood
  • More than 1,000 Google searches
  • More than 750 emails and text messages
  • More than 250 contact names and email addresses
  • Four previous owners’ identities
  • One completed loan application.
“More than 80,000 used smartphones are for sale daily on eBay in the U.S. Along with their phones, consumers may not realize they are selling their memories and their identities. Images, emails, and other documents deleted from phones can be exploited for identity theft, blackmail, or for even stalking purposes. Selling your used phone is a good way to make a little extra money, but it’s potentially a bad way to protect your privacy,” added McColgan.

For more information on how to protect your mobile device, read the 5 essential mobile security tips





Spotlight

The role of the cloud in the modern security architecture

Posted on 31 July 2014.  |  Stephen Pao, General Manager, Security Business at Barracuda Networks, offers advice to CISOs concerned about moving the secure storage of their documents into the cloud and discusses how the cloud shaping the modern security architecture.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Aug 1st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //