How to stop hackers from reaching your deleted files

How to deal with a lost, stolen or retired phone or mobile device

Picture: Levent Ali, Flickr

Picture: Levent Ali, Flickr

What happens when you delete a file? Unknown to most, deleted data from a mobile phone can still be shared with others if not appropriately managed. In a worst-case scenario, this could end up in the hands of a hacker or e-criminal, and used against you.

With most IT equipment, when a file is deleted, one of two processes could take place: logical deletion or physical deletion. Logical deletion, where the file system space the file occupies is marked as available, is used by almost all operating systems for performance reasons, but at the cost of keeping the information physically stored until it happens to be overwritten with the contents of a new file. In contrast, physical deletion modifies the data of the deleted file bit by bit, by creating junk content on the storage medium. This ensures the data cannot be recovered, but takes much longer and therefore usually is considered undesirable for tasks where the user experience is central.

Ultimately, even after you delete a file, there is a chance your information can be recovered.

What happens if you restore to factory settings?

This can vary depending on the platform. Research carried out in early 2015 revealed performing a factory reset on Apple and BlackBerry devices prevents information from being later recovered, due to the physical deletion procedure as well as a stronger control over the companies' hardware.

However, encryption is not included by default on all Android devices, consequently making it possible to recover a lot of the data that had been stored on them, even after running several factory resets.

What are the dangers of logical deletion?

As personal devices and cell phones hold an array of totally private data, from credit card details, web browser history and passwords to more personal information such as contact details of friends and family, photos, texts and access to social media accounts.

Naturally, access to such data could enable a cybercriminal to orchestrate a social engineering attack against the handset's owner leading to extortion or fraud.

For this reason, taking preventive measures up-front are vital to minimising risk of data theft or misconduct.

So, how can you protect yourself?

Read more: ​Sony Xperia X Performance review: Sony’s most disappointing product in years

Luckily, there are numerous precautions you can take to ensure you don’t fall victim to identity fraud or other cybercrimes:

- Encrypt the device

This is the simplest option for Android users. When activated before restoring the factory settings, encryption makes the data unable to be deciphered even if the data is not physically deleted. Remember, the more complex the password, the more difficult it will be for cybercriminals to crack.

You can encrypt your Android system by going to Settings > Security > Encrypt device, and the reset options are located in Settings > Backup & reset > Factory data reset. Also, note that if extra storage, such as a micro SD card, has been installed in devices that support it, you need to decide whether you wish to encrypt that also. These are typically referred to as “external SD cards”, and encrypting them requires an additional step. Another way to format the device’s storage is by accessing recovery mode. However, the results of this method are the same.

Read more: Review: Incipio OtterBox and 3Sixt cases for the Samsung Galaxy S7 and S7 Edge

- Reset the device

Although some apps on the Google Play Store promise to overwrite certain parts of the device storage that have been marked as free by the operating system, that free space may still contain the original data. A factory reset needs to be carried out both before and after running the app. In addition, users will need to avoid using the Google Play Store to install the app, so as to avoid entering their Google account data into the phone again.

- Remove all external cards

If a phone is sold or given away, don’t forget to remove the SIM card and also the micro SD card.

Mobile privacy is a growing concern and with the rise of data breaches, costing a whopping A$2.82m on average for enterprises in Australia, it’s important for consumers to be privacy savvy and take on a proactive approach to protecting personal information. Understanding best practices is the first step, but taking this information on-board and embedding it into your every day lives and habits are imperative.

Nick FitzGerald is Senior Research Fellow at ESET

Join the Good Gear Guide newsletter!

Error: Please check your email address.

Tags securitymobile

Our Back to Business guide highlights the best products for you to boost your productivity at home, on the road, at the office, or in the classroom.

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Nick Fitzgerald

PC World
Show Comments

Cool Tech

Crucial Ballistix Elite 32GB Kit (4 x 8GB) DDR4-3000 UDIMM

Learn more >

Gadgets & Things

Lexar® Professional 1000x microSDHC™/microSDXC™ UHS-II cards

Learn more >

Family Friendly

Lexar® JumpDrive® S57 USB 3.0 flash drive 

Learn more >

Stocking Stuffer

Plox Star Wars Death Star Levitating Bluetooth Speaker

Learn more >

Christmas Gift Guide

Click for more ›

Most Popular Reviews

Latest News Articles

Resources

GGG Evaluation Team

Kathy Cassidy

STYLISTIC Q702

First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni

STYLISTIC Q572

For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell

LIFEBOOK UH574

The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi

STYLISTIC Q702

The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Simon Harriott

STYLISTIC Q702

My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.

Featured Content

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?