Security

Hidden Danger of Unsanitized Hard Drives
Secure Data Recovery, the leader in RAID, SSD, and hard drive recovery, recently outlined how to properly dispose of hard dri...
Posted by Timothy Burlee May 16, 2023
Study Reveals the States Most Susceptible to Scammers
While technology has enriched society, it has also ushered in new nuisances. From spam texts to robocalls, these menaces have...
Posted by Yevgeniy Reznik March 24, 2023
Study: Americans’ privacy may be at risk as people overshare about politics, kids, and bodily functions
Online privacy has been a topic of concern for decades. Despite this, we willingly post a plethora of personal information on...
Posted by Yevgeniy Reznik February 27, 2023
How to Dispose of Hard Drives
Disposing old or unused hard disk drives (HDDs) has never been more essential. Researchers at Cybersecurity Ventures project ...
Posted by Timothy Burlee January 27, 2023
Survey Reveals the Apps Americans Trust Least with Their Data
Downloading an app on your phone only takes a few clicks. Uploading your personal information and creating a password is just...
Posted by Yevgeniy Reznik January 26, 2023
Why You Need a Cleanroom for Hard Drive Recovery
A cleanroom is a specialized environment that uses advanced air filtration and uni-directional airflow to remove airborne par...
Posted by Philip Bader August 25, 2022
Apple Issues Urgent Security Patch for iOS, macOS
This month saw several security updates released by Microsoft to protect users from newly discovered cybersecurity vulnerabil...
Posted by Philip Bader July 28, 2021
Silver Sparrow Malware Targets Apple’s New M1 Chip
Cybersecurity firm Red Canary announced earlier this month that two of its detection engineers had made an unusual discovery:...
Posted by Philip Bader February 26, 2021
Journalists' iPhones Hit with 'Zero-Click' Exploit
Dozens of journalists working for the Al Jazeera news agency have likely been the target of a sophisticated zero-click spywar...
Posted by Philip Bader December 23, 2020
Key US Agencies Among Targets of SolarWinds Hack
Initial reports of a sophisticated attack on U.S. government agencies were light on details. Reuters said hackers had been mo...
Posted by Philip Bader December 16, 2020
The Importance of Data Destruction and Deletion
Data destruction is the process of destroying data stored on tapes, hard disks, flash drives, and all other storage devices. ...
Posted by Laura Bednar February 21, 2019
Email Server Has No Backup After System-Wide Hack
VFEmail, an email server that aims to “Make email safe for the masses,” was hacked on February 11th. This server was created ...
Posted by Laura Bednar February 15, 2019
What the Supreme Court Ruling Means for your Cell Phone Data...and What it Doesn't
The Supreme Court just made a major statement on the boundaries of digital privacy for cell phone users. The case centered on...
Posted by Laura Bednar July 02, 2018
SecureDrive, our new self-encrypting hard drive offers top security and top performance
Encryption is one of the most effective strategies to protect data from loss and compromise. Self-encrypting drives (SEDs) of...
Posted by Laura Bednar April 11, 2018
Protecting your Data during Tax Time
Tax season is a particularly risky time because the need to review and send sensitive data over various channels leaves you v...
Posted by Laura Bednar March 05, 2018