Deleting files and history is not enough to maintain privacy.

At least 100 mobile devices are an open window on user privacy. Files that are saved or passwords that are entered on multiple device platforms seem to have eternal life if the system is not restored or deleted properly.

The National Association on the Destruction of Information of the United States (NAID) has analyzed the contents of 250 devices, including hard drives, tablets and second-hand mobile phones available on the market. The study reveals that two out of five devices had personal information from previous owners.

A note from the National Cybersecurity Institute (INCIBE) explains that among the information retrieved there were user accounts, passwords, photographs, videos, credit card numbers, contacts, and some invoices.

The report concludes that it is important to delete all mobile accounts and Internet history before disposing of it or selling it to third parties.

The most likely cause is that a telephone factory reset is carried out, but even so, WhatsApp and Facebook passwords can be retrieved, according to Cambridge University scientists.

Experts assume that zero risk in the world of cybersecurity is almost impossible to achieve. But you want to minimize the damage and that is why it is important to make the user aware.

You have to realize that you handle a lot of personal information that is recorded in parts that you probably have not thought about. A large amount of data is encrypted and accumulated in the cloud.

The cloud, a hunting ground for ‘hackers’

When you delete a document from a device, it does not always disappear for life. The phone memory is released and the system marks the space as available, according to the guidelines of the Office of Internet Security (OSI).

But the content sent to the trash can be recovered. It is one of the halls of hackers with backups and the cloud.

The simplest way to find a deleted file is to look in the bin of the device that works as a bookcase whose new books have pushed the old one towards the bottom, but even if the information is not seen, it is still there.

In the event that the trash is emptied and the presence of the document is in a far corner of the storage, there are tools such as Recuva or Wondershare Data Recovery that proceed to a system scan before proposing a list of all rescued files.

Many users believe that cybercriminals only focus on personalities that have something to lose, such as politicians, companies or celebrities, but this is a false belief.

All people are exposed equally, even without being “anyone.” The main objective of cyber attacks is to reach as many people as possible.

A simple history of Google searches reveals to the hacker the tastes and hobbies of the user, where he lives and even his bank card number still registered with Amazon, the expert details.

In an Android system, the photos remain in a “temporary bin” and the apps usually have the session started. From there, the user gives a free way to impersonate their identity or share their private content.

To address this universal vulnerability companies often develop updates to the general system or the particular app to correct security flaws.

These updates not only serve to improve the tool and make it more beautiful, but to defend the user from cybercriminals who already know the secrets of the old system perfectly.

In fact, WhatsApp has recently been subject to suspicion due to imperfections. INCIBE has warned that it is essential to download the new update 2.19.283 of the app.

Devices with outdated apps could allow an attacker to execute arbitrary code and thus take possession of the device or obtain personal information from its owner.

Leave a Reply

Your email address will not be published. Required fields are marked *

You May Also Like

The middle class that vanished

  One of the giants of the South experiences the highest rates…

The TB pandemic that nobody sees, but that kills millions a year

  31.8 million people will have died by 2030 if tuberculosis is…