Skip to content

New Safe Harbor Agreement Needed

U.S. businesses that handle personal and company data from overseas may face higher costs and stricter regulations due to a new European legal ruling that finds American law is too weak to protect online privacy. Last month, the European Court of Justice (similar to the U.S. Supreme Court) struck down…

RAID Data Recovery Guide and Tips

Critical data is often stored on RAID systems because the configurations are considered to be fault tolerant. RAID systems can be configured to keep working when one drive fails allowing disks to be hot swapped while the system keeps running, but even this setup of an array of drives is…

The Discovery Channel Visits DriveSavers

On Friday, June 19th, 2015, Lucas Cochran, technology correspondent from DAILY PLANET on the Discovery Channel Canada, came to visit DriveSavers. DriveSavers Director of Engineering, Mike Cobb, walked Lucas through recovering the data from his own Samsung phone. Just a few days prior, Lucas had dropped his phone in a pool where…

Music Recovery—The Power of Music to Heal

It is said that time heals all wounds, but what about music? For 19-year-old James Gordon, music might just save his life. “Music can change the world because it can change people.” Bono  James, a Massachusetts high school senior and drummer, turned to music in high school after struggling for years…

More Wearables Mean More Security Concerns

If you don’t have a computer on your wrist yet, get ready because your time is coming. And, you’d better be careful. The worldwide forecast for wearable technology sales is up 173 percent this year, according to a new report from International Data Corp. (IDC). IDC predicts 72.1 million units will…

Protect Your Android Phone from App Attacks

If you use an Android phone, please take this advice­—now For your protection, never buy apps from any discount sellers and always use a malware or security scanner to weed out problems with software before an infection can occur, according to a new report from G Data Security Labs. For…

What Happens to Data After Recovery?

In every successful data recovery, the recovered contents from the affected drive are copied onto another device, often a hard drive. A new flash drive is appropriate for customers with smaller amounts of recovered data. This “target drive” is what we send to the customer in order to return their…

New Malware Implodes on Detection, Taking Your Data Down

An insidious computer virus that reacts violently when detected—destroying everything onboard—is now on the loose. Researchers from Cisco Systems Talos Group discovered the malware threat, called Rombertik. Like many other threats, this one is made up of particularly virulent code attached to a seemingly innocuous email. The bug is designed…

Back To Top
Search