Monday 29 April 2013

[wanabidii] Re: Recycled phones reta in their previous owners’ data

As long as kitu kicho kimewasiliana kwa namna yoyote na kingine kuna uwezekano mkubwa wa kuweza kurudisha taarifa zilizomo , lakini wakati mwingine hutegemeana na aina ya taarifa zilizomo nyingine sio rahisi kuzirudisha kwa asilimia 100 lakini angalau inawezekana kuonyesha kwamba kulikuwa na kitu fulani sehemu fulani .

Kwa kesi kama hii ni vizuri sasa watu wajenge utamaduni wa kuwa na mipango maalumu kwa ajili ya kuhifadhi taarifa zao haswa za vifaa vya mawasiliano na hii ianzie huko TCRA na kampuni za mawasiliano katika kutoa elimu hii kwa watumiaji au wateja mbalimbali .

Kuna simu niliwahi kumpa mtu kama zawadi lakini nikawa naifuatilia kwa njia nyingine mpaka leo huu mwaka wa 2 huyo mtu hii simu aliiuza kwahiyo taarifa zote huwa nazipokea kutumia namba nyingine za simu hata pale anapochukuwa laini tofauti ya simu na kuingiza .


On Mon, Apr 29, 2013 at 8:11 PM, jonas mwende <jonassism@yahoo.com> wrote:
 

Jojo,
I conquer with you in addition, Hasan:

Take exemplary  of employee with Blackberry or any other smartphone to access their official mails via these devices,when they recycle these devices, its likely,data might be exposed to third parties intentionally or unintentionally.
Mind you:::Employees smartphone is one of BYOD approach!!!
Yonas



From: jojo jo <jmn20002@yahoo.com>
To: "jonassism@yahoo.com" <jonassism@yahoo.com>; "hwekesa@gmail.com" <hwekesa@gmail.com>
Cc: "eThinkTankTz@yahoogroups.com" <eThinkTankTz@yahoogroups.com>; "Wanazuoni@yahoogroups.com" <Wanazuoni@yahoogroups.com>
Sent: Monday, April 29, 2013 11:41 AM
Subject: Re: [eThinkTankTz] BYOD??Recycled phones retain their previous owners' data

 
Well everything mate!
The fact is based on the law of proximities
When two systems interact they leave traces of such interactions and erasure and factory resets of portables connected to corp networks will not necessarily prevent unwanted leakage or exposure.traces can be widely ranging fron net configs to whole IP bank details, IDs etc
Sent from Yahoo! Mail on Android


From: Hassan Wekesa <hwekesa@gmail.com>;
To: jonas mwende <jonassism@yahoo.com>;
Cc: eThinkTankTz@yahoogroups.com <eThinkTankTz@yahoogroups.com>; Wanazuoni <Wanazuoni@yahoogroups.com>;
Subject: Re: [eThinkTankTz] BYOD??Recycled phones retain their previous owners' data
Sent: Sun, Apr 28, 2013 10:53:20 AM



What has this got to do with BYOD?
Hassan


On Wed, Apr 24, 2013 at 3:25 PM, jonas mwende <jonassism@yahoo.com> wrote:
 

Recycled phones retain their previous owners' data

18 April 2013

Too many users are recycling their old phones without realising that data is left behind even after deletion or a factory reset. With employees now using their devices for both business and personal purposes, the result could be the inadvertent loss of confidential information.

Mobile phone contracts generally have a 12-24 month contract, and new handsets are released just as quickly. As a result, users often upgrade their phones as fast as they renew their contracts – and combined with difficult economic times this has led to a large second-owner mobile phone market. But mobile phones are hugely personal and increasingly powerful devices, used for private, financial and business purposes – and data left behind could be a problem for both the owner and his or her employer.
BlackBelt, a mobile phone security firm, wanted to see whether users adequately remove data from their old phones before recycling them to friends, family, or strangers. In partnership with YouGov it surveyed more than 2000 UK adults to discover attitudes and practices in mobile phone data wiping. It found that 25% of users have knowingly owned a second-hand or refurbished device; and that nearly a third of those had found the previous owner's contacts, photos or other information. "I'd heard anecdotal evidence about the amount of private data, people were finding on second hand handsets, however these figures throw this into stark relief," commented Ken Garner, BlackBelt's business development manager.
Users seem to understand the need to clean out their data before recycling and often try to do so – but, quite rightly, do not believe it is very effective. For example, 59% of recyclers have tried to manually delete their data, 72% have removed their SIM card, and 50% have performed a factory reset. But despite this only 26% believe that manual deletion completely wipes data from the handset, and only 37% believe a factory reset is fully effective.
The simple fact is that it is difficult to remove data from a mobile device because of the wear leveling technique used to promote the life of solid state memory. Solid state has a limited lifetime. Wear leveling increases this by distributing the memory usage so that no single area gets overused too quickly, and by minimizing data overwrites. "In reality," notes BlackBelt, "it isn't possible for an individual to perform a full removal of personal data from any smart phone or tablet using a device's in-built factory reset or by re-flashing the operating system. This is because contemporary devices are fitted with solid state memory, which uses a technique called wear leveling to minimize data corruption and extend its lifespan by over-ruling instructions to permanently overwrite old data."
If the data isn't overwritten, it is relatively easy to recover. Wired recently tested this. "We wanted to see what kind of data was lurking on our devices, so we rounded up every old phone we could scrounge up from around the office and asked the owners to wipe them," it reported. Then it gave them to AccessData, one of several companies that sells phone forensic software. AccessData recovered email data, documents, photos, contacts, and a geographic history based on WiFi access points. "So what can you do about all this the next time you're ready to upgrade phones? The alarming answer is not much," concluded Wired.
BYOD makes this a business as well as a personal problem. "With the rise of Bring Your Own Device schemes in the workplace, it's not just our personal data that's at risk," warns BlackBelt's Garner. And there's only two real solutions. The first, suggested by Wired, is a hammer. The second, suggested by BlackBelt, is specialist software that will do the job thoroughly: there is software to recover phone data; and there is software to destroy phone data.
This article is featured in:
Data Loss  •  Internet and Network Security  •  Wireless and Mobile Security
 





__._,_.___
Reply via web post Reply to sender Reply to group Start a New Topic Messages in this topic (1)
Recent Activity:
MARKETPLACE


.

__,_._,___



--
www.wejobs.blogspot.com Jobs in Africa
www.jobsunited.blogspot.com International Job Opportunities

--
Send Emails to wanabidii@googlegroups.com
 
Kujiondoa Tuma Email kwenda
wanabidii+unsubscribe@googlegroups.com Utapata Email ya kudhibitisha ukishatuma
 
Disclaimer:
Everyone posting to this Forum bears the sole responsibility for any legal consequences of his or her postings, and hence statements and facts must be presented responsibly. Your continued membership signifies that you agree to this disclaimer and pledge to abide by our Rules and Guidelines.
---
You received this message because you are subscribed to the Google Groups "Wanabidii" group.
To unsubscribe from this group and stop receiving emails from it, send an email to wanabidii+unsubscribe@googlegroups.com.
For more options, visit https://groups.google.com/groups/opt_out.
 
 

0 comments:

Post a Comment