Researchers at Avast Find that Data Remains on Phone After Factory Reset

Researchers at Avast Find that Data Remains on Phone After Factory Reset

Researchers at Avast Find that Data Remains on Phone After Factory Reset

Security researchers at Avast, a security software developer, found that data from a smart phone can remain on the device even after a factory reset. This includes information such as photos, videos and sometimes contacts.

This was discovered after the company purchased a number of phones that were assumed to be “wiped,” or cleared of any data from the previous user. What they found instead was over 40,000 photos, 750 emails and texts, and the names and addresses of 250 people.

The fear, according to Avast, is the possibility of secondhand retail markets allowing users to sell phones that still have their personal data on them to strangers. Instead of actually wiping the data itself from the phone, operating systems delete the data linking those files to the rest of the OS. With the proper tools, recovering this information is relatively simple and the data will remain there until new information is written over it.

Avast and other security software manufacturers are attempting to help solve the problem by developing software that sets itself between the user and the phone, usually through a standalone application.

About the Author

Matt Holden is an Associate Content Editor for 1105 Media, Inc. He received his MFA and BA in journalism from Ball State University in Muncie, Indiana. He currently writes and edits for Occupational Health & Safety magazine, and Security Today.

Featured

  • Until We Meet Again

    A short three years ago we were all pondering whether to attend any tradeshows all thanks to COVID-19. Sorry to bring that nightmare up again, but it seems that little pandemic is in the rear-view mirror, and it’s time to meet again. Read Now

    • ISC West
  • Cyber Hygiene: What it Looks Like for IoT Devices

    Cyber Hygiene: What it Looks Like for IoT Devices

    For our second pillar about the Industrial Internet of Things (IIoT) Pillars of Security, we are going to discuss what cyber hygiene looks like for IoT devices. Read Now

  • ISC West Announces 2023 Keynote Series Speaker Lineup

    The International Security Conference (ISC), in collaboration with premier sponsor Security Industry Association (SIA), announced five of this year’s ISC West Keynote Series speakers. ISC West will kick off its annual conference on March 28 (SIA Education@ISC: March 28-30 | Exhibit Hall: March 29-31) at the Venetian Expo in Las Vegas, Nevada. Read Now

    • ISC West
  • Accelerating Security Modernization

    In recent years, the term “digital transformation” has been one of the most frequently used buzzwords across industries. On its most basic level, it refers to the reimagining of how an organization leverages its technology systems to improve business processes. Read Now

Featured Cybersecurity

New Products

  • Dinkle DKU Barrier Terminal Blocks

    Dinkle DKU Barrier Terminal Blocks

    New DKU screw type terminal blocks use a spring-guided system where the screws are integrated and captive within the terminal enclosure. These screws can be backed out so that ring- or U-shaped cable lugs can be inserted, without the possibility of losing the screw. 3

  • Pivot3 Surety

    Pivot3 Surety

    Pivot3 has announced Surety, a new intelligent software framework to simplify the management and monitoring of physical security environments. 3

  • Paxton10 CORE Cameras

    Paxton10 CORE Cameras

    The new CORE Series cameras feature edge processing for ultimate scalability, built-in edge storage, and plug-and-play installation. The addition of the CORE Series gives installers new hardware, better choice, and more value than ever before. 3