“The message was a phishing spam,” says fish. “And a poorly disguised one at that, full of misspellings in its instructions to follow a link and fill in a form to reactivate e-mail.
“But the alert message contained the live link, and there was no way I was going to send this to my users. So I waited to see what developed.”
A few moments later, fish’s regional manager forwards the same message, with the same live link, and instructs everyone on the mailing list to warn their local users. Seguir leyendo “OK, maybe not so urgent”
With stories abounding of identity theft aided by information lifted from discarded storage devices, you want devices you no longer plan to use to have no usable information when they head out the door.
Here’s how to wipe them clean.
Sure, you could erase the contents of the drive, but keep this in mind: the act of erasing a file does not remove it from a storage device. Seguir leyendo “How To Erase Your Data So No One Can Ever Recover It”