New research conducted by the University of Hertfordshire revealed that two-thirds of second-hand Memory card’s still contains the personal data from previous owners
Based on the research, people aren’t sufficiently erasing data from their personal data before selling their old memory cards which are used from mobile phones and tablets.
This In-depth research conducted by the University of Hertfordshire which is commissioned by Comparitech.com, security and privacy reviews website on sold and used memory cards.
Research uncovered that sold memory card into secondhand contains personal information and sensitive materials, including passport copies, contact lists and identification numbers being passed from one person to the next.
A team of researchers purchased around 100 used SD and micro SD memory cards from eBay, secondhand shops and other external sources for the previous 4 months.
All the gathered memory cards ware analyzed using freely available software to recover data and also created a forensic image of each memory card copy.
After the complete analysis researchers were able to recover 65 % memory cards data that contains selfies, contact lists, navigation files, pornography, resumes, browsing history and other more confidential data.
University of Hertfordshir, Cyber Security Professor Andrew Jones,said” This research uncovers the prevalence of second-hand memory cards providing a rich source of sensitive data, that could easily be misused if a buyer so wished. Despite the ongoing media focus on cybercrime and the security of personal data, it is clear from our research that the majority are still not taking adequate steps to remove all data from memory cards before sales.”
Researchers purchased a different type of storage capacity memory cards and complete analyzed it using various ways using publicly available forensic tools.
According to comparitech memory cards were analyzed and given the following result.
These all are the sensitive data eventually used by cyber criminals for various malicious purposes so users avoid selling their used memory cards else make sure the memory card has been completely wiped.
Cybersecurity researchers are sounding the alarm that hackers are exploiting software vulnerabilities faster than ever before. A new report from…
Hackers were actively exploiting the generative AI for cyber attacks; not only that, even threat actors are also exploring new…
Security researchers have published a Proof-of-Concept (PoC) exploit for a critical vulnerability in the widely used PuTTY SSH and Telnet…
Modern cars have microcontrollers that use the Controller Area Network (CAN) to perform safety and luxury functions. However, vehicle hijacking…
The latest Nexusguard DDoS Trend Report for 2024 has unveiled a significant escalation in the size of Distributed Denial of…
Researchers have identified a new form of cyberattack termed "LLMjacking," which exploits stolen cloud credentials to hijack cloud-hosted large language…