{"id":28656,"date":"2021-01-29T14:23:08","date_gmt":"2021-01-29T12:23:08","guid":{"rendered":"https:\/\/www.kaspersky.co.za\/blog\/data-on-used-devices\/28656\/"},"modified":"2021-01-29T14:23:08","modified_gmt":"2021-01-29T12:23:08","slug":"data-on-used-devices","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.za\/blog\/data-on-used-devices\/28656\/","title":{"rendered":"Uncovering private data in secondhand sales"},"content":{"rendered":"<p>Kaspersky\u2019s Global Research and Analysis Team (GReAT) has <a href=\"https:\/\/www.businessleader.co.uk\/used-not-useless-data-on-second-hand-devices-creates-a-cybersecurity-concern-for-businesses\/107570\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">examined<\/a> security in secondhand devices. The devices, which DACH research heads Marco Preuss and Christian Funk scrutinized for two months in late 2020, included used laptop computers and a variety of storage media such as hard drives and memory cards.<\/p>\n<p>Their goal was not to determine differences according to device type but rather to examine the data on them \u2014 to learn how electronic data relates to person-to-person or other secondary market sales. As a seller, what traces might you be leaving behind? As a buyer, how can you make your device behave as if it were brand-new \u2014 and until you do, is using your new-to-you device even safe?<\/p>\n<h2>Findings<\/h2>\n<p>An overwhelming majority of the devices the researchers examined contained at least some traces of data \u2014 mostly personal but some corporate \u2014 and more than 16% of the devices gave the researchers access outright. Another 74% gave up the goods when the researchers applied file-carving methods. A bare 11% had been wiped properly.<\/p>\n<p>The data Preuss and Funk found included items that could potentially be harmless or terribly revealing and even dangerous: calendar entries, meeting notes, company resource access data, internal documents, personal photos, medical information, tax documents, and more. Furthermore, as Funk pointed out, personal data doesn\u2019t tend to lose value over time; you can\u2019t simply wait out the risk and feel safer after some time passes (not that feeling safe actually lessens risk in any way).<\/p>\n<p>In addition to directly usable information such as contact lists, tax documents, and medical records (or access to them through saved passwords), electronic devices contain information that can cause secondhand damage; consider how cybercriminals exploit the information they glean from social network profiles and posts. The contents of a digital device are vastly more informative.<\/p>\n<h2>Did we mention the malware?<\/h2>\n<p>It\u2019s safe to say no one else shares your precise tolerance for digital device security. Some may lock things up even tighter than you do, but if you\u2019re buying secondhand, it\u2019s not unlikely you\u2019ll receive not just someone else\u2019s data but also bonus malware. Of the devices Preuss and Funk examined, 17% triggered our virus scanner alarms.<\/p>\n<h2>Prequel: A broader study<\/h2>\n<p>The research we\u2019re reporting on here actually began with a <a href=\"https:\/\/www.techradar.com\/news\/second-hand-devices-are-an-absolute-privacy-nightmare\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">study<\/a> that Kaspersky commissioned from Arlington Research. It queried several thousand adult consumers in the United Kingdom, Germany, and Austria. The initial study functioned as a confirmation of sorts, finding that secondhand digital sales are indeed robust and indeed a reliable source of data leaks; fewer than half of the many hundreds of buyers did not find any photos, \u201cexplicit material,\u201d contact details, sensitive documents such as passports, or login details on the devices they\u2019d purchased.<\/p>\n<h3>Seller, beware<\/h3>\n<p>Although approximately 10% of the survey\u2019s respondents had been given devices on which they found the seller\u2019s info, not many of them would ignore, immediately delete, or report found data to the original owner or any authorities. Beyond just taking a peek (which 74% of respondents said they\u2019d find a way to do), more than 1 in 10 admitted they would sell the data they found if they thought they could profit from it.<\/p>\n<h2>Advice and tips<\/h2>\n<p>The United Kingdom\u2019s National Cyber Security Centre provides some <a href=\"https:\/\/www.ncsc.gov.uk\/guidance\/buying-selling-second-hand-devices\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">practical advice<\/a> for buyers and sellers of secondhand electronic devices, from backing up personal data to making sure the device is as clean as a new one would be.<\/p>\n<h3>For sellers<\/h3>\n<p>As a seller, your top priority is getting your information off the device you\u2019re selling so that you can keep it both secure and private. Yes, it\u2019s also important to make sure the device is safe, which we hope you\u2019ve done all along, but the point here is to keep your stuff to yourself.<\/p>\n<ul>\n<li>Back up your data: Whether it\u2019s on a phone, a computer, a memory card, or another form of storage, securely <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-backup\/19589\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">back it up<\/a> before deleting it from the device you\u2019re selling;<\/li>\n<li>Remove SIM and storage cards from phones; erase the eSIM if your device uses one;<\/li>\n<li>Enable two-factor authentication for any accounts that allow it, and then sign out of every service (banking, e-mail, social media, etc.) on the device you\u2019re selling;<\/li>\n<li>Depending on the device in question, perform a factory reset or format the media;<\/li>\n<li>Keep in mind that in many circumstances data may be recoverable even after a factory reset or media format. To be sure nothing is left on the device, you need to take additional steps, which vary depending on the device type, model, and configuration; search for information on securely deleting all data from yours.<\/li>\n<\/ul>\n<h3>For buyers<\/h3>\n<p>Our advice for buyers of secondhand devices is very much like our advice for general digital ownership, but a bit more stringent because we have to assume a secondhand device is dirty. Better safe than sorry.<\/p>\n<ul>\n<li>Depending on the device in question, perform a factory reset or format the storage media;<\/li>\n<li>Install and activate <a href=\"https:\/\/www.kaspersky.co.za\/premium?reseller=en-za_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener\">a reliable security solution<\/a> immediately \u2014 if possible, before even purchasing the device \u2014 to offset the risk of encountering malware already present on a device, and perform a scan before using the device for the first time.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"ksc-trial-generic\">\n","protected":false},"excerpt":{"rendered":"<p>Our experts define the deluge of data on used devices.<\/p>\n","protected":false},"author":2045,"featured_media":28657,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1788],"tags":[3433,1027,43,3434,3435],"class_list":{"0":"post-28656","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-privacy","8":"tag-buying-secondhand","9":"tag-connected-devices","10":"tag-privacy","11":"tag-secondhand-sales","12":"tag-selling-devices"},"hreflang":[{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/data-on-used-devices\/28656\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/data-on-used-devices\/22470\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/data-on-used-devices\/17960\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/data-on-used-devices\/24175\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/data-on-used-devices\/22252\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/data-on-used-devices\/20950\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/data-on-used-devices\/24618\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/data-on-used-devices\/23817\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/data-on-used-devices\/30039\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/data-on-used-devices\/9288\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/data-on-used-devices\/38610\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/data-on-used-devices\/16332\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/data-on-used-devices\/16904\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/data-on-used-devices\/14432\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/data-on-used-devices\/26158\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/data-on-used-devices\/29960\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/data-on-used-devices\/26649\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/data-on-used-devices\/28850\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.za\/blog\/tag\/privacy\/","name":"privacy"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/28656","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/users\/2045"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/comments?post=28656"}],"version-history":[{"count":0,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/28656\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media\/28657"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media?parent=28656"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/categories?post=28656"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/tags?post=28656"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}