SlideShare a Scribd company logo
1 of 2
Download to read offline
®




Do you store personal data
on your mobile phone?
If you do then you could be putting yourself at risk of identity fraud, especially
if you sell or dispose of your mobile phone without completely wiping personal
data. In our live experiment we examined 35 second hand mobile phones
and 50 SIM cards purchased on eBay as well as used electronics shops, to see
what personal information was available on the handsets and whether it
constituted a threat to their former owners’ identities.


                                                                                                 Key findings




     Key
     findings
                                  54% of second hand mobile phones contained personal data
                              including credit/debit card numbers, PIN numbers and passwords
                                                                                                        54%



      ®




                                   The experiment revealed 247 pieces of personal information
                                    despite the vast majority of people (81%) claiming to have
                                           wiped their mobile or SIM card before selling them        81%



                                                   Half of second hand mobile phone owners
                                                           admitted they have found personal            50%
                                                           information from a previous owner




                                                       58 per cent have sold or given away an
                                                       old mobile phone or SIM card with the
                                                                                                        58%
                                                                  average resale price of £47




   Manually wiping the data was the most common method to delete information
   - a process that security experts acknowledge leaves the data intact and retrievable
®




On the mobile phones and SIM cards we reviewed we
found the following data:


                                                                                  Passwords                               Contacts

                                                                                  Usernames                               Credit Cards Numbers

                    SMS                                                           Bank Details                            Video

                                                                                  Photos                                  Email Address

                                                                                  Notes                                   Company Information




                       CPP’s top tips on wiping your mobile phone of personal information:

                Restore all factory settings – this is the first step that you should take as it is the easiest precaution before disposing of
                the unit, but factory resets are far from permanent so follow steps 2 – 4 to protect your data


                Remove your SIM card and destroy it


                Delete back-ups - even if your smartphone, PDA or laptop data is securely removed from the mobile device, it can continue to
                exist on a back up somewhere else

                Log out and delete– make sure you have logged out of all social networking sites, emails, wireless connections, company
                networks and applications. Once you are logged out make sure you delete the password and connection

                Various passwords - avoid using the same ID/password on multiple systems and storing them on your mobile phone, if you
                are going to store them on your phone use a picture that reminds you of the password


                If you are selling on your phone ensure you ask for it to be wiped to be on the safe side



                Don’t store vast amounts of personal information on your mobile phone / SIM



                Make sure you check your bank statements regularly to monitor for suspicious transactions


                Remember the Golden Rule: Identity thieves are experts at spotting an opportunity to steal your identity and only need a few
                personal details

                If you want more information on how to protect yourself or see how these experiments worked, please visit CPP’s blog
                http://blog.cpp.co.uk/




ICM interviewed a random sample of 2011 adults aged 18+ online between 16 – 18 February 2011. Surveys were conducted across the country and the results have been
weighted to the profile of all adults. ICM is a member of the British Polling Council and abides by its rules. Further formation at www.icmresearch.co.uk. A live experiment
was also carried out in February 2011. Ethical hacker Jason Hart was commissioned by CPP to conduct a number of reviews relating to the data contents of re-sold mobile
devices used and SIM cards within the United Kingdom. 35 second hand mobile phones and 50 SIM cards were analysed during the live experiment. All data found on
mobile phones was deleted - either manually or by using the forensic software to remove and destroy the information. The SIM cards were destoyed.

More Related Content

Recently uploaded

Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdf
Overkill Security
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Recently uploaded (20)

ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdf
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهله
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
Navigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi DaparthiNavigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi Daparthi
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
 
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 

Featured

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Featured (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

CPP experiment looks at ID fraud risk associated with selling second hand mobiles

  • 1. ® Do you store personal data on your mobile phone? If you do then you could be putting yourself at risk of identity fraud, especially if you sell or dispose of your mobile phone without completely wiping personal data. In our live experiment we examined 35 second hand mobile phones and 50 SIM cards purchased on eBay as well as used electronics shops, to see what personal information was available on the handsets and whether it constituted a threat to their former owners’ identities. Key findings Key findings 54% of second hand mobile phones contained personal data including credit/debit card numbers, PIN numbers and passwords 54% ® The experiment revealed 247 pieces of personal information despite the vast majority of people (81%) claiming to have wiped their mobile or SIM card before selling them 81% Half of second hand mobile phone owners admitted they have found personal 50% information from a previous owner 58 per cent have sold or given away an old mobile phone or SIM card with the 58% average resale price of £47 Manually wiping the data was the most common method to delete information - a process that security experts acknowledge leaves the data intact and retrievable
  • 2. ® On the mobile phones and SIM cards we reviewed we found the following data: Passwords Contacts Usernames Credit Cards Numbers SMS Bank Details Video Photos Email Address Notes Company Information CPP’s top tips on wiping your mobile phone of personal information: Restore all factory settings – this is the first step that you should take as it is the easiest precaution before disposing of the unit, but factory resets are far from permanent so follow steps 2 – 4 to protect your data Remove your SIM card and destroy it Delete back-ups - even if your smartphone, PDA or laptop data is securely removed from the mobile device, it can continue to exist on a back up somewhere else Log out and delete– make sure you have logged out of all social networking sites, emails, wireless connections, company networks and applications. Once you are logged out make sure you delete the password and connection Various passwords - avoid using the same ID/password on multiple systems and storing them on your mobile phone, if you are going to store them on your phone use a picture that reminds you of the password If you are selling on your phone ensure you ask for it to be wiped to be on the safe side Don’t store vast amounts of personal information on your mobile phone / SIM Make sure you check your bank statements regularly to monitor for suspicious transactions Remember the Golden Rule: Identity thieves are experts at spotting an opportunity to steal your identity and only need a few personal details If you want more information on how to protect yourself or see how these experiments worked, please visit CPP’s blog http://blog.cpp.co.uk/ ICM interviewed a random sample of 2011 adults aged 18+ online between 16 – 18 February 2011. Surveys were conducted across the country and the results have been weighted to the profile of all adults. ICM is a member of the British Polling Council and abides by its rules. Further formation at www.icmresearch.co.uk. A live experiment was also carried out in February 2011. Ethical hacker Jason Hart was commissioned by CPP to conduct a number of reviews relating to the data contents of re-sold mobile devices used and SIM cards within the United Kingdom. 35 second hand mobile phones and 50 SIM cards were analysed during the live experiment. All data found on mobile phones was deleted - either manually or by using the forensic software to remove and destroy the information. The SIM cards were destoyed.