Caveat Venditor, Used USB Drive Owner

by   James Conacher, et al.

USB drives are a great way of transferring and backing up files. The problem is that they are easily lost, and users do not understand how to secure or properly erase them. When used to store private and sensitive information, this constitutes a risk that users may be unaware of. Consider that people sell used USB drives online – presumably either their own or drives others have lost. This raises some interesting questions, such as whether sellers know how to ensure that private data is erased before they relinquish the drive to an unknown buyer, and whether sellers use these drives in an attempt to compromise an unwary buyer's device. Governments do indeed issue advice about the risks of used mobile media, but we do not yet know whether this advice is reaching, and being heeded by, the general public. To assess the situation, a sample of used USB drives were purchased from eBay sellers to determine, first hand, what was on the drives. This acts as an indicator of actual security-related behaviours to answer the questions posed above. Using forensic analysis, it was found that a great deal of private and sensitive information remained on many of the drives, but there was no trace of malicious software. More effective ways of enlightening the public are needed, so that private data is not unwittingly leaked via sold used media.


page 3

page 6

page 8


Examining the impacts of privacy awareness on user's self-disclosure on social media

This research aims to investigate the impact of users' privacy awareness...

PP-DBLP: Modeling and Generating Attributed Public-Private Networks with DBLP

In many online social networks (e.g., Facebook, Google+, Twitter, and In...

The tradeoff between the utility and risk of location data and implications for public good

High-resolution individual geolocation data passively collected from mob...

Private Private Information

In a private private information structure, agents' signals contain no i...

#maskUp: Selective Attribute Encryption for Sensitive Vocalization for English language on Social Media Platforms

Social media has become a platform for people to stand up and raise thei...

Detection and Analysis of Drive-by Downloads and Malicious Websites

A drive by download is a download that occurs without users action or kn...

MAGNETO: Fingerprinting USB Flash Drives via Unintentional Magnetic Emissions

Universal Serial Bus (USB) Flash Drives are nowadays one of the most con...

Please sign up or login with your details

Forgot password? Click here to reset