General discussion


Used mobile devices share secrets

By milal ·
This article is yet another example of why users of mobile devices need to pay attention to what they keep on these machines and the security measures they implement.**5.html?tag=tb

In regard to laptops and PDAs, both of which are highly suceptible to security breaches, what sort of protection do you recommend to prevent data theft?

This conversation is currently closed to new comments.

Thread display: Collapse - | Expand +

All Comments

Collapse -

More on recycling hardware.

by mroonie In reply to Used mobile devices share ...

There are lots of issues surrounding the recycling of old hardware, especially with computers.

Many studies have shown that large amounts of sensitive information about companies and individuals are found in recycled hardware parts that were not fully encrypted or deleted before reselling/redistribution.

Check out Remote Laptop Security on Wikipedia for more on this.

Collapse -


by Maevinn In reply to More on recycling hardwar ...

All hard drives, CDs, and portable media are cleaned with either a 3 stage wipe software, degaussed, or destroyed prior to disposal.

Related Discussions

Related Forums