Friday, May 2, 2025
HomeComputer Security65% Second-Hand Memory card's Still have the Previous Owners Personal Data -...

65% Second-Hand Memory card’s Still have the Previous Owners Personal Data – Reveals by New Research

Published on

SIEM as a Service

Follow Us on Google News

New research conducted by the University of Hertfordshire revealed that two-thirds of second-hand Memory card’s still contains the personal data from previous owners

Based on the research, people aren’t sufficiently erasing data from their personal data before selling their old memory cards which are used from mobile phones and tablets.

This In-depth research conducted by the University of Hertfordshire which is commissioned by Comparitech.com, security and privacy reviews website on sold and used memory cards.

- Advertisement - Google News

Research uncovered that sold memory card into secondhand contains personal information and sensitive materials, including passport copies, contact lists and identification numbers being passed from one person to the next.

A team of researchers purchased around 100 used SD and micro SD memory cards from eBay, secondhand shops and other external sources for the previous 4 months.

All the gathered memory cards ware analyzed using freely available software to recover data and also created a forensic image of each memory card copy.

65% Memory card’s Data Recovered

After the complete analysis researchers were able to recover 65 % memory cards data that contains selfies, contact lists, navigation files, pornography, resumes, browsing history and other more confidential data.

Memory card's
University of Hertfordshir, Cyber Security Professor Andrew Jones,said” This research uncovers the prevalence of second-hand memory cards providing a rich source of sensitive data, that could easily be misused if a buyer so wished. Despite the ongoing media focus on cybercrime and the security of personal data, it is clear from our research that the majority are still not taking adequate steps to remove all data from  before sales.”

Researchers purchased a different type of storage capacity memory cards and complete analyzed it using various ways using publicly available forensic tools.

Memory card's

According to comparitech memory cards were analyzed and given the following result.

  • 36 were not wiped at all—neither the original owner nor the seller took any steps to remove the data.
  • 29 appeared to have been formatted, but data could still be recovered “with minimal effort.”
  • 25 appeared to have been properly wiped using a data erasing tool that overwrites the storage area, so nothing could be recovered.
  • 4 could not be accessed (read: were broken).
  • 4 had no data present, but the reason could not be determined.
  • 2 cards had their data deleted, but it was easily recoverable.

These all are the sensitive data eventually used by cyber criminals for various malicious purposes so users avoid selling their used memory cards else make sure the memory card has been completely wiped.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Cyberattack Targets Iconic UK Retailer Harrods

Luxury department store Harrods has become the latest UK retailer to face a cyberattack,...

Nebulous Mantis hackers have Deployed the RomCom RAT globally, Targeting organizations.

Nebulous Mantis, also known as Cuba, STORM-0978, Tropical Scorpius, and UNC2596, is a Russian-speaking...

Why CISOs Are Adopting DevSecOps for Secure Software Development

CISOs adopting DevSecOps strategically enhance security measures while ensuring fast-paced software development, responding to...

Dutch Services Disrupted by DDoS Attacks From Russian-Affiliated Hacktivists

Multiple Dutch organizations have experienced significant service disruptions this week due to a series...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Is this Website Safe: How to Check Website Safety – 2025

is this website safe? In this digital world, Check a website is safe is...

Firefox 133.0 Released with Multiple Security Updates – What’s New!

Mozilla has officially launched Firefox 133.0, offering enhanced features, significant performance improvements, and critical...

Digital Wallets Bypassed To Allow Purchase With Stolen Cards

Digital wallets enable users to securely store their financial information on smart devices and...