Does Defragmenting A Solid-State Drive Cause Data Loss?

Defragmenting a solid-state drive (SSD) is a bad idea...under most circumstances. Here's a brief overview of how defragmentation works, why it's largely unnecessary for solid-state drives, and what you can do instead.
September 30, 2019

Are You Using Safe Email Practices?

Even as communication and project management tools like Slack, Cisco Spark, and Hive gain popularity, email continues to be the most widely used medium for both internal and external business communications worldwide. With that level of ubiquity, it’s unsurprising that...
September 25, 2019

Are You Using Safe Email Practices?

Even as communication and project management tools like Slack, Cisco Spark, and Hive gain popularity, email continues to be the most widely used medium for both internal and external business communications worldwide. Additionally, while it’s largely been overtaken by text...
August 15, 2019

Data Security 101: What Is A Phishing Attack?

Phishing attacks can be remarkably sophisticated, and every computer user should extend how they work. Here's what you need to know to stay safe.
July 17, 2019

Hackers Access Details Of 460,000 Customers From Uniqlo Retail Chain

Japanese markets are reeling after Fast Retailing, owner of the country’s popular Uniqlo retail chain, announced that hackers gained unauthorized access to more than 460,000 customer accounts. The compromised data included personally identifiable information such as names, addresses, contact info,...
May 14, 2019

Apple Confirms: Some MacBook Pro Solid-State Drives Have a Critical Data Loss Issue

Apple has announced free services for a “limited number of 128GB and 256GB” solid-state drives for some 13-inch MacBook Pro models sold from June 2017 and June 2018. According to the company, the affected drives have an issue that can...
November 12, 2018

Protecting Your Computer When Traveling: 3 Essential Tips

When you’re traveling, you probably don’t spend much time thinking about your computer. That can change in a second when you accidentally splash water onto your laptop or leave a USB drive behind in a hotel room.At Datarecovery.com, we...
July 19, 2018

Why Ransomware Criminals are Moving Away from Bitcoin

Bitcoin used to be the preferred payment method of cybercriminals. Last year, we reported that the hackers behind the WannaCry ransomware infected PCs worldwide, and demanded payment in the form of Bitcoin from their victims. Hackers asked for Bitcoin because...
June 29, 2018

How to Check If Your Router Is Compromised (And Reboot It)

The FBI has warned that a malware product called VPNFilter has infected over 500,000 devices, including wireless routers and network-attached storage systems. Obviously, this is a major concern in our industry, and we want to help our customers keep their...
June 12, 2018

SamSam Ransomware Infection And Decryption Services

SamSam ransomware (also known as Samas, SamSamCrypt, and MSIL) is a quickly evolving type of malware that targets hospitals, municipalities, and other large organizations. After installing malicious software through compromised servers, the hackers encrypt network files, making them unusable, and...
April 11, 2018