Skip to content

Protect Your Android Phone from App Attacks

If you use an Android phone, please take this advice­—now For your protection, never buy apps from any discount sellers and always use a malware or security scanner to weed out problems with software before an infection can occur, according to a new report from G Data Security Labs. For…

What Happens to Data After Recovery?

In every successful data recovery, the recovered contents from the affected drive are copied onto another device, often a hard drive. A new flash drive is appropriate for customers with smaller amounts of recovered data. This “target drive” is what we send to the customer in order to return their…

New Malware Implodes on Detection, Taking Your Data Down

An insidious computer virus that reacts violently when detected—destroying everything onboard—is now on the loose. Researchers from Cisco Systems Talos Group discovered the malware threat, called Rombertik. Like many other threats, this one is made up of particularly virulent code attached to a seemingly innocuous email. The bug is designed…

Recycler ou réutiliser ?

After a hard drive is recovered by DriveSavers, our standard practice is to return the equipment to the user. We don’t repair the drives so if they are not working when they come to the lab, they leave in the same condition. When a customer doesn’t want their broken equipment…

Haut de page
Rechercher