Risks of selling used smartphones

AVAST Software easily retrieved personal data from used smartphones sold online, despite consumers deleting their data. From the used devices, researchers was able to recover more than 40,000 personal photos, emails, text messages, and – in some cases – the identities of the sellers.

“The amount of personal data we retrieved from the phones was astounding. We found everything from a filled-out loan form to more than 250 selfies of what appear to be the previous owner’s manhood,” said Jude McColgan, President of Mobile at AVAST.

“We purchased a variety of Android devices from sellers across the U.S. and used readily available recovery software to dig up personal information that was previously on the phones. The take-away is that even deleted data on your used phone can be recovered unless you completely overwrite it,” added McColgan.

AVAST analyzed 20 used smartphones whose previous owners had performed a factory reset or a “delete all” operation on their devices. Despite these efforts, AVAST was able to recover the following personal information:

  • More than 40,000 stored photos
  • More than 1,500 family photos of children
  • More than 750 photos of women in various stages of undress
  • More than 250 selfies of what appear to be the previous owner’s manhood
  • More than 1,000 Google searches
  • More than 750 emails and text messages
  • More than 250 contact names and email addresses
  • Four previous owners’ identities
  • One completed loan application.

“More than 80,000 used smartphones are for sale daily on eBay in the U.S. Along with their phones, consumers may not realize they are selling their memories and their identities. Images, emails, and other documents deleted from phones can be exploited for identity theft, blackmail, or for even stalking purposes. Selling your used phone is a good way to make a little extra money, but it’s potentially a bad way to protect your privacy,” added McColgan.

For more information on how to protect your mobile device, read the 5 essential mobile security tips

Don't miss