Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Mobile

3/21/2013
05:29 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Mobile Device Data Recoveries Up 161 Percent

Across all types of recovery scenarios, Kroll Ontrack found data loss incidents are platform-independent

EPSOM, March 21, 2013 – According to the International Telecommunication Union, the number of mobile phones worldwide is expected to exceed the world's population by 2014, with overall penetration rates reaching 96% globally by the end of this year. Consistent with the widespread adoption of mobile devices, Kroll Ontrack, the world leader in data recovery and edisclosure software, saw a 55% increase in mobile device recoveries for phones and tablets from 2010 to 2011, and a 161% increase from 2011 to 2012. With more and more people storing valuable personal and business data on their mobile devices, there is no doubt the demand for recovery when something goes wrong will continue to climb.

"For mobile devices, physical damage is the most common cause of data loss we see, representing about two-thirds of data recovery cases," said Phil Bridge, managing director, Kroll Ontrack. "Inherent in their purpose, mobile devices are simply on the go, and therefore more susceptible to human error, including drops, which can cause electronic failure, and water damage. The other third are from logical failures, such as accidentally deleted files, corrupt software, password lockout and OS upgrade issues."

Mobile device failure breakdown

Ontrack Data Recovery engineers report that in 2012, for recovery resulting from physical failure, 31% of cases were electronics-related physical damage, 23% were the result of water or moisture damage and seven percent were related to damage to the exterior of the device. For recovery resulting from logical failure, 26% were the result of deleted files, seven percent were software corruption and six percent were cases of password lockout. Across all types of recovery scenarios, Kroll Ontrack has found that data loss incidents are platform independent and occur within iOS, Android, and Windows devices.

Mobile device recovery process

"In most cases, recovery can be attained by way of physical repair or bypassing a corrupted OS," said Robert Winter, chief engineer, Kroll Ontrack. "Once repair or OS bypass is successful, Kroll Ontrack specialised software tools are then used to target critical files and provide customers with comprehensive evaluations and detailed file reports of the files that can be recovered."

Specifically, in instances of physical damage, Ontrack Data Recovery engineers open the device within a cleanroom environment and assess the physical condition of the circuit boards and parts through a comprehensive diagnostic process. The mobile device's printed circuit board (PCB) parts are examined and repaired as needed to get the device to a state where the data can be read. When there is logical failure, such as a corrupt operating system or failed OS update, engineers use specialised software to bypass the identified issue and then access and extract the data.

"When my son dove into a pool with his iPhone in his pocket, he lost hundreds of contacts and two years' worth of photos that were very important to our family," said James Smith. "We had never made a backup of his phone and thought the data was forever lost. With Kroll Ontrack's expertise in mobile phone recoveries, all his data was recovered and restored to his new phone for a very reasonable price and we backed up the information to our family computer."

Tips for handling data loss

The most requested data to be recovered from mobile devices are photos/videos and contacts, followed by notes and text messages. To promote the best chance of success in recovering this valuable data, Kroll Ontrack suggests the following:

· Time is of the essence. Power off the mobile device immediately and get it to a reputable data recovery provider. The longer you wait, the more likely critical data will be overwritten (deleted files) or the drive will corrode (physical damage such as water).

· Backup, backup, backup. Before disaster strikes, back-up your data to another device, such as a laptop, the cloud or an external drive. If you get an operating system error, this backup is often the saving grace in the recovery process.

· Know what you want. The key to recovering data quickly is to know what data to target. Communicate to your data recovery provider what data is most critical to better ensure a timely and accurate recovery.

About Kroll Ontrack Inc.

Kroll Ontrack provides technology-driven services and software to help legal, corporate and government entities as well as consumers manage, recover, search, analyze and produce data efficiently and cost-effectively. In addition to its award-winning suite of software, Kroll Ontrack provides data recovery, data destruction, electronic discovery and document review. Kroll Ontrack is a subsidiary of Altegrity, an industry-leading provider of information solutions. For more information about Kroll Ontrack and its offerings please visit: http://www.krollontrack.co.uk and follow Kroll Ontrack on Twitter @KrollOntrack.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 5/22/2020
How an Industry Consortium Can Reinvent Security Solution Testing
Henry Harrison, Co-founder & Chief Technology Officer, Garrison,  5/21/2020
Is Zero Trust the Best Answer to the COVID-19 Lockdown?
Dan Blum, Cybersecurity & Risk Management Strategist,  5/20/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-13458
PUBLISHED: 2020-05-25
An issue was discovered in the Image Resizer plugin before 2.0.9 for Craft CMS. There are CSRF issues with the log-clear controller action.
CVE-2020-13459
PUBLISHED: 2020-05-25
An issue was discovered in the Image Resizer plugin before 2.0.9 for Craft CMS. There is stored XSS in the Bulk Resize action.
CVE-2020-13442
PUBLISHED: 2020-05-25
A Remote code execution vulnerability exists in DEXT5Upload in DEXT5 through 2.7.1402870. An attacker can upload a PHP file via dext5handler.jsp handler because the uploaded file is stored under dext5uploadeddata/.
CVE-2020-5537
PUBLISHED: 2020-05-25
Cybozu Desktop for Windows 2.0.23 to 2.2.40 allows remote code execution via unspecified vectors.
CVE-2020-13438
PUBLISHED: 2020-05-24
ffjpeg through 2020-02-24 has an invalid read in jfif_encode in jfif.c.