When people upgrade their phones, laptops, or tablets, the old devices often end up in trade-in programs or at electronic waste collection points. But what happens to the personal information stored on those devices after they leave your hands? The answer is more complicated than many assume.
Resale programs and secure erasure
Companies that refurbish and resell electronics usually follow structured procedures to protect customer data. Devices that are still functional and have resale value are wiped using certified erasure software, designed to make data permanently inaccessible. This process typically produces a digital certificate confirming that the wipe was completed. Devices that cannot be repaired or reused are diverted to recycling instead.
Recycling centres and hidden risks
Collection centres that process large volumes of e-waste follow a different model. Devices are first sorted and stripped of hazardous parts such as batteries, before being fed into shredders that break down the materials for recovery. While this may sound final, experts point out that the chain of custody for individual devices is not always secure. In the past, some recyclers offered on-site data destruction services, but these programs were scaled back due to high operating costs.
Although the risk of someone recovering data from shredded parts is very low, it is not entirely impossible. The cost of reconstructing files often outweighs the potential value of the data, but individuals who store sensitive information may still face exposure if devices are not properly erased before recycling.
Factory reset: not a full solution
Many users believe that deleting files or performing a factory reset provides sufficient protection. However, a reset often only clears visible settings and does not necessarily erase underlying data. Depending on the device, fragments of information such as banking details, personal messages, or login credentials can still be retrieved by someone with technical expertise.
Steps you can take before disposal
Security experts recommend that users take precautions themselves rather than relying solely on resellers or recyclers. Before handing over a device:
1. Back up essential files and remove linked accounts.
2. Take out SIM cards and memory cards.
3. Encrypt the device to make any remaining data unreadable.
4. Use secure-erase software or request an erasure certificate if trading in.
5. For highly sensitive information, consider physically destroying the storage drive instead of recycling.
Not every device poses the same risk. For routine personal use, secure erasure and responsible recycling are usually sufficient. For devices holding highly confidential or financial data, stronger measures are advisable. But experts also warn against avoiding recycling altogether. Keeping outdated electronics at home or in storage carries its own risks, as devices can still be stolen or accessed.
Ultimately, safeguarding personal information before disposal is the responsibility of the user. Taking a few extra steps now can protect your privacy while ensuring devices are recycled responsibly.
"KLM has reported to the Dutch Data Protection Authority; Air France has done this in France at the CNIL. Customers whose data may have been accessed are currently being informed and advised to be extra alert to suspicious emails or phone calls," the group said.
With 78,000 employees and a fleet of 564 aircraft, Air France-KLM offers services for 300 destinations in 90 countries worldwide. The group transported 98 million passengers globally in 2024. The airlines said that they have closed the threat actors’ access to the hacked systems once the breach was discovered. They also claim that the attack didn’t impact their networks.
"Air France and KLM have detected unusual activity on an external platform we use for customer service. This activity resulted in unauthorized access to customer data. Our IT security teams, along with the relevant external party, took immediate action to stop the unauthorized access. Measures have also been implemented to prevent recurrence. Internal Air France and KLM systems were not affected," the group said.
The attackers stole data, including names, email addresses, contact numbers, transaction records, and details of rewards programs. But the group has said that the passengers’ personal and financial data was not compromised. The airlines have informed the concerned authorities in the respective countries of the attack. They have also notified the impacted individuals about the breach.
"KLM has reported the incident to the Dutch Data Protection Authority; Air France has done so in France with the CNIL.” "Customers whose data may have been accessed are currently being informed and advised to be extra vigilant for suspicious emails or phone calls," they said.
A major player in the global fashion jewellery market for many years, Pandora has long been positioned as a dominant force in this field as the world's largest jewellery brand. However, the luxury retailer is now one of a growing number of companies that have been targeted by cybercriminals.
A cyberattack has brought down one of Germany’s largest phone insurance and repair networks, forcing the once-thriving Einhaus Group into insolvency. The company, which at its peak generated around €70 million in annual revenue and partnered with big names such as Deutsche Telekom, Cyberport, and 1&1, has been unable to recover from the financial and operational chaos that followed the attack.
The Day Everything Stopped
In March 2023, founder Wilhelm Einhaus arrived at the company’s offices to an unsettling sight. Every printer had churned out the same note: “We’ve hacked you. All further information can be found on the dark web.” Investigations revealed the work of the hacking group known as “Royal.” They had infiltrated the company’s network, encrypting all of its core systems, the very tools needed to process claims, manage customer data, and run daily operations.
Without these systems, business ground to a halt. The hackers demanded around $230,000 in Bitcoin to unlock the computers. Facing immediate and heavy losses, and with no way to operate manually at the same scale, Einhaus Group reportedly agreed to pay. The financial damage, however, was already severe, estimated in the multi-million-euro range. Police were brought in early, but the payment decision was made to avoid even greater harm.
Desperate Measures to Stay Afloat
Before the attack, the company employed roughly 170 people. Within months, more than 100 positions were cut, leaving only eight employees to handle all ongoing work. With so few staff, much of the processing had to be done by hand, slowing operations dramatically.
To raise funds, the company sold its headquarters and liquidated various investments. These moves bought time but did not restore the business to its former state.
Seized Ransom, But No Relief
In a twist, German authorities later apprehended three suspects believed to be linked to the “Royal” group. They also seized cryptocurrency valued in the high six-figure euro range, suspected to be connected to the ransom payments.
However, Einhaus Group has not received its money back. Prosecutors have refused to release the seized funds until investigations are complete — a process that could take years. Other ransomware victims in Germany are in the same position, with no guarantee they will ever recover the full amount.
Final Stages of the Collapse
Three separate companies tied to the Einhaus Group have now formally entered insolvency proceedings. While liquidation is a strong possibility, founder Wilhelm Einhaus, now 72, insists he has no plans to retire. If the business is dissolved, he says he will start again from scratch.
The Einhaus case is not unique. Just recently, the UK’s 158-year-old transport company Knights of Old collapsed after a ransomware attack by a group known as “Akira,” leaving 700 people jobless. Cyberattacks are increasingly proving fatal to established businesses not just through stolen data, but by dismantling the very infrastructure needed to survive.
On Christmas Eve, Cyberhaven, a data loss prevention company, experienced a cyberattack targeting its Google Chrome extension. The breach exposed sensitive customer data, including passwords and session tokens. The company has since taken swift measures to address the issue and prevent future incidents.
The attack occurred after a Cyberhaven employee fell victim to a phishing email, inadvertently sharing their credentials. This gave the attacker access to Cyberhaven’s systems, specifically the credentials for the Google Chrome Web Store. Leveraging this access, the attacker uploaded a malicious version (24.10.4) of the Cyberhaven Chrome extension. The compromised version was automatically updated on Chrome-based browsers and remained active from 1:32 AM UTC on December 25 to 2:50 AM UTC on December 26.
Swift Response by Cyberhaven
Cyberhaven’s security team discovered the breach at 11:54 PM UTC on Christmas Day. Within an hour, they removed the malicious extension from the Web Store. CEO Howard Ting praised the team’s dedication, stating, “Our team acted swiftly and with remarkable dedication, interrupting their holiday plans to safeguard our customers and maintain our commitment to transparency.”
While no other Cyberhaven systems, such as CI/CD processes or code signing keys, were affected, the compromised extension potentially enabled the exfiltration of user cookies and authenticated sessions for specific targeted websites. This incident underscores the persistent risks posed by phishing attacks and the critical need for robust security measures.
Mitigation Measures for Users
To mitigate the impact of the breach, Cyberhaven has advised users to take the following steps:
These proactive measures are essential to prevent further exploitation of compromised credentials.
Enhanced Security Measures
In response to the attack, Cyberhaven has implemented additional security protocols to strengthen its defenses. The company is also working with law enforcement to investigate the breach and identify the attackers, who reportedly targeted other companies as well.
This attack highlights the increasing sophistication of cyber threats, particularly those exploiting human error. Phishing remains one of the most effective tactics for gaining unauthorized access to sensitive systems. Companies must prioritize employee training on recognizing phishing attempts and establish multi-layered security frameworks to mitigate vulnerabilities.
Cyberhaven’s swift response and transparent communication reflect its commitment to customer security and trust. As the investigation continues, this incident serves as a stark reminder of the importance of vigilance in the ever-evolving landscape of cybersecurity threats.