DriveSavers Data Recovery Blog

Do Cloud Backup Services Hold Water?

Tuesday, August 25th, 2015

What, exactly, is the cloud? Is it some magical method of storing your computer’s ones and zeros within a wireless frequency, floating around in the air like an actual cloud? No—far from it! What the Cloud Actually Is It’s not magic and it doesn’t float in the air. When you choose a cloud backup solution, […]

» Read More

Intel and Micron Debut Blazing Fast Memory Chips

Wednesday, August 05th, 2015

A new memory chip, capable of working 1,000 times faster than current NAND flash chips, is due for release next year from a joint partnership between Intel and Micron. While the two tech firms didn’t give out too many details regarding the new 3D XPoint technology, they said in a news release that their discovery […]

» Read More

More Wearables Mean More Security Concerns

Tuesday, July 28th, 2015

If you don’t have a computer on your wrist yet, get ready because your time is coming. And, you’d better be careful. The worldwide forecast for wearable technology sales is up 173 percent this year, according to a new report from International Data Corp. (IDC). IDC predicts 72.1 million units will ship this year, thanks […]

» Read More

Protect Your Android Phone from App Attacks

Thursday, July 23rd, 2015

If you use an Android phone, please take this advice­—now. For your protection, never buy apps from any discount sellers and always use a malware or security scanner to weed out problems with software before an infection can occur, according to a new report from G Data Security Labs. For recommended malware scanning software, check […]

» Read More

The Discovery Channel Visits DriveSavers

Friday, July 17th, 2015

On Friday, June 19th, Lucas Cochran, technology correspondent from DAILY PLANET on the Discovery Channel Canada, came to visit DriveSavers. DriveSavers Director of Engineering, Mike Cobb, walked Lucas through recovering the data from his own Samsung phone. Just a few days prior, Lucas had dropped his phone in a pool where it had sat for a […]

» Read More

Samsung Offers 2TB SSD for Consumers

Thursday, July 16th, 2015

Samsung has doubled the size of its biggest consumer SSDs and is now selling a 2TB solid-state drive for your desktop computer, rivaling the capacity of more traditional spinning hard disk drives. The new 850 Evo ($799.99) comes with a five-year warranty and the 850 Pro SSD ($999.99) has a 10-year warranty. Both were introduced […]

» Read More

What Happens to Data After Recovery?

Wednesday, June 17th, 2015

In every successful data recovery, the recovered contents from the affected drive are copied onto another device, often a hard drive. A new flash drive is appropriate for customers with smaller amounts of recovered data. This “target drive” is what we send to the customer in order to return their recovered data. In an emergency, […]

» Read More

7 Ways to Secure Your Smartphone

Thursday, June 11th, 2015

Your smartphone–that mini computer that lives in your pocket–deserves the same protection as your personal laptop and work computer does. Use the following guidelines to protect your on-the-go information from hackers and thieves. Use a pin or password to protect your smartphone. Do not share the password with strangers and do not keep the password […]

» Read More

Global Reach for Data Breaches

Wednesday, June 03rd, 2015

What really happens to your personal information if it gets swept up in one of those big data breaches that have hit companies like Target, Anthem Health and Sony? Bitglass, a data security company, devised a test to measure what could happen to an individual’s personal data after a breach. Bitglass developed a list of […]

» Read More

New Malware Implodes on Detection, Taking Your Data Down

Wednesday, May 06th, 2015

An insidious computer virus that reacts violently when detected—destroying everything onboard—is now on the loose. Researchers from Cisco Systems Talos Group discovered the malware threat, called Rombertik. Like many other threats, this one is made up of particularly virulent code attached to a seemingly innocuous email. The bug is designed to collect everything the user […]

» Read More