Monday, March 1, 2021
  • Setup menu at Appearance » Menus and assign menu to Top Bar Navigation
Advertisement
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News
No Result
View All Result
NikolaNews
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News
No Result
View All Result
NikolaNews
No Result
View All Result
Home Internet Security

How to securely wipe your iPhones, Android devices, and PCs

August 13, 2019
in Internet Security
How to securely wipe your iPhones, Android devices, and PCs
586
SHARES
3.3k
VIEWS
Share on FacebookShare on Twitter

How to really erase any drive
Securely erasing drives before you sell a computer keeps your personal information from falling into the wrong hands. Good news: it’s easier than ever to fully erase data.

If you want to know the best ways of deleting data, there’s no better information than that offered by government agencies. One such agency is the UK’s National Cyber Security Centre (NCSC), and it has published guidelines for how to deal with the factory reset and reprovisioning of end-user devices, and it makes very interesting reading.

You might also like

These four new hacking groups are targeting critical infrastructure, warns security company

Privacy Commissioner asks for clarity on minister’s powers in Critical Infrastructure Bill

TikTok agrees to pay $92 million to settle teen privacy class-action lawsuit

Must read: The 2019 iPhone 11 will be annoying, boring, and expensive

The guidelines consider four common scenarios, some of which apply more to governments and businesses, while others apply equally to home and small business users.

The four data sanitization scenarios considered are:

  • Wiping devices compromised by malware
  • Preparing new devices
  • Reissuing a device to someone else at a similar level within an organization
  • Sanitizing a device for resale or reissue to someone with lesser access to data within an organization or for resale

The guide goes on to look at Android, iOS, and Windows separately and contains many useful gems of information that might be overlooked. 

For example:

  • Android devices that have been infected with malware should not be trusted in a high-security environment even after a factory reset or reinstallation of the firmware, as advanced malware may still persist
  • Remember that with Android, external SD cards are not wiped during the factory reset
  • A DFU (Device Firmware Upgrade) Mode restore is considered to be the most secure way to wipe an iOS device, especially a compromised device
  • There are risks to using older version of iTunes to carry out a DFU Mode restore on iOS devices, so make sure to upgrade to the latest version
  • Wiping the TPM on a Windows machine does not guarantee that the data is not recoverable because the recovery key may still exist, so the drive will still need wiping

The NCSC also has a separate document on sanitizing storage media, and this too has some very useful – and easily overlooked – information.

  • Remember that commercial photocopiers and printers can contain gigabytes of information in their internal memory that can be retrieved
  • It is worth checking displays for “burn-in” as this could display sensitive information
  • Chips on printed circuits can contain information, which can be recoverable forensically
  • When shredding circuit boards, everything should be destroyed to fragments no larger than 6 mm.
  • Hard drives that have held sensitive information should be degaussed their platters broken into at least four roughly equal-sized pieces to assure complete destruction
  • Encrypting drives – especially SSDs and hybrid drives (HDD+SSD) – helps prevent data leaks through improper or incomplete wiping

There’s also a handy page offering basic advice for end-users. This is good for those who want a primer of security, or a refresher on what is considered good practice.

How do you handle devices when they are being reprovisioned or have come to the end of their life?

See also:

Credit: Zdnet

Previous Post

Epic Games Hit With Class Action Lawsuit Over Hacked 'Fortnite' Accounts

Next Post

Quantum Computing in plain English

Related Posts

These four new hacking groups are targeting critical infrastructure, warns security company
Internet Security

These four new hacking groups are targeting critical infrastructure, warns security company

February 28, 2021
Privacy Commissioner asks for clarity on minister’s powers in Critical Infrastructure Bill
Internet Security

Privacy Commissioner asks for clarity on minister’s powers in Critical Infrastructure Bill

February 28, 2021
TikTok agrees to pay $92 million to settle teen privacy class-action lawsuit
Internet Security

TikTok agrees to pay $92 million to settle teen privacy class-action lawsuit

February 28, 2021
Cybercrime groups are selling their hacking skills. Some countries are buying
Internet Security

Cybercrime groups are selling their hacking skills. Some countries are buying

February 28, 2021
Why would you ever trust Amazon’s Alexa after this?
Internet Security

Why would you ever trust Amazon’s Alexa after this?

February 28, 2021
Next Post
Quantum Computing in plain English

Quantum Computing in plain English

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Plasticity in Deep Learning: Dynamic Adaptations for AI Self-Driving Cars

Plasticity in Deep Learning: Dynamic Adaptations for AI Self-Driving Cars

January 6, 2019
Microsoft, Google Use Artificial Intelligence to Fight Hackers

Microsoft, Google Use Artificial Intelligence to Fight Hackers

January 6, 2019

Categories

  • Artificial Intelligence
  • Big Data
  • Blockchain
  • Crypto News
  • Data Science
  • Digital Marketing
  • Internet Privacy
  • Internet Security
  • Learn to Code
  • Machine Learning
  • Marketing Technology
  • Neural Networks
  • Technology Companies

Don't miss it

AI And Automation In HR: The Changing Scenario Of The Business
Data Science

AI And Automation In HR: The Changing Scenario Of The Business

February 28, 2021
Machine learning could aid mental health diagnoses: Study
Machine Learning

Machine learning could aid mental health diagnoses: Study

February 28, 2021
Python vs R! Which one should you choose for data Science
Data Science

Python vs R! Which one should you choose for data Science

February 28, 2021
Can Java be used for machine learning and data science?
Machine Learning

Can Java be used for machine learning and data science?

February 28, 2021
These four new hacking groups are targeting critical infrastructure, warns security company
Internet Security

These four new hacking groups are targeting critical infrastructure, warns security company

February 28, 2021
The Time-Series Ecosystem – Data Science Central
Data Science

The Time-Series Ecosystem – Data Science Central

February 28, 2021
NikolaNews

NikolaNews.com is an online News Portal which aims to share news about blockchain, AI, Big Data, and Data Privacy and more!

What’s New Here?

  • AI And Automation In HR: The Changing Scenario Of The Business February 28, 2021
  • Machine learning could aid mental health diagnoses: Study February 28, 2021
  • Python vs R! Which one should you choose for data Science February 28, 2021
  • Can Java be used for machine learning and data science? February 28, 2021

Subscribe to get more!

© 2019 NikolaNews.com - Global Tech Updates

No Result
View All Result
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News

© 2019 NikolaNews.com - Global Tech Updates