Don’t just ‘delete,’ – DELETE!

Many of EFF’s recommendations involve copying data onto an external device and then removing it from the device you’ll be carrying across the border. When doing this, you will want to make sure that the data you delete is actually gone. Simply pressing the ‘delete’ key or emptying the desktop waste basket makes the data disappear, but it doesn’t necessarily remove the data in question from a device.

Many of EFF’s recommendations involve copying data onto an external device and then removing it from the device you’ll be carrying across the border. When doing this, you will want to make sure that the data you delete is actually gone. Simply pressing the ‘delete’ key or emptying the desktop waste basket makes the data disappear, but it doesn’t necessarily remove the data in question from a device. A competent forensics examiner will be able to recover files that were merely deleted, unless you securely delete files using a data destruction tool that removes and overwrites the data in memory.

(Image via eofstr‘s Flickr photostream)

Suggested articles

2020 Cybersecurity Trends to Watch

Mobile becomes a prime phishing attack vector, hackers will increasingly employ machine learning in attacks and cloud will increasingly be seen as fertile ground for compromise.

Top Mobile Security Stories of 2019

Cybercrime increasingly went mobile in 2019, with everything from Apple iPhone jailbreaks and rogue Android apps to 5G and mobile-first phishing dominating the news coverage. Here are Threatpost’s Top 10 mobile security stories of 2019.