Dropbox Cache: The Hidden Folder Hackers Really Dig

Dropbox Cache: The Hidden Folder Hackers Really Dig

If you are one of the hundreds of millions who regularly use Dropbox, there is something you should know: While the service provides a very handy and hassle free way for file storage, syncing and sharing, its cache folder, hidden on your hard drive, can easily turn into a goldmine for hackers. Dropbox cache was designed to offer users a quick and effortless way to restore deleted files, so it retains a copy of every single file you delete, on your HDD.

Read More

Windows XP End Of Support-Best Practices For Secure Migration From The OS

Windows XP End Of Support-Best Practices For Secure Migration From The OS

Microsoft has ended its support for the very popular OS on April 8, 2014. If that move made you decide to migrate to Windows 7, or 8 in fear of increasing privacy threats, we would like to draw your attention to some crucial privacy steps you need to take in order to guarantee a secure transition. We are going to walk you through security issues from backup to HDD sanitization.

Read More

Windows XP End Of Support-Privacy Protection Best Practices If You Stick With The OS

Windows XP end of support-Privacy protection best practices if you stick with the OS

April 8, 2014 marked the day when Microsoft ended its support–after 13 years– for one of its most successful OS ever, Windows XP. Since you are likely to be one of the millions of users this move has left guessing whether it is the beginning of the end when it comes to privacy security, in this article we would like to address the most important privacy concerns surrounding the issue. But before doing so, we would like to issue an official statement for our customers using Windows XP.

Read More

Choose From 14 Data Wiping Standards With The Intuitive Slider Selector

Choose From 14 Data Wipe Standards With The Intuitive Slider Selector

There are numerous data wipe standards for the secure removal of sensitive information from PC hard drives and removable data storage devices. east-tec Eraser offers you 14 of them. In this article we would like to recommend you wipe methods for different privacy scenarios and tell you what speed/security balance you can expect when running them. We have also included screenshots to show you how much it is a child`s play to switch between standards with the software’s built-in slider selector.

Read More

Giving Away Copies Of Secrets When Using Copy Machines

Giving away copies of secrets when using copy machines

What is the common risk in having your documents photocopied or scanned at your local copy center, having your medical records faxed to you, and passing on or disposing of digital copy machines you own and use in your office?  Read on to find out how copiers can be a source of trouble both for owners and copy center customers.

It might come as a surprise, but most digital copy machines have powerful hard drives, just like computers do. Hard drives help them work faster by enabling multi-tasking or job queuing. But hard drives also store digital image copies of everything these multifunctional devices copy, print, scan, or email. And just like it is risky to leave sensitive information on computer hard drives unerased, it is a serious privacy hazard to do the same when it comes to copy machines.

Read More