#HP restored + data saved + ready to continue
Explore tagged Tumblr posts
shikiimisaki · 1 year ago
Text
taking a shower at almost 3am having the same effect on me as an undertale save point
3 notes · View notes
alwaysbigwombat · 4 years ago
Text
Kyocera Printers Drivers For Mac
Tumblr media
Kyocera Printer Drivers For Mac 10.10
Kyocera Universal Print Driver
Tumblr media
Technical FAQ - Distribution of print drivers and settings in a cross platform architecture (Server 2008 R2 64 bit - Clint Windows XP 32 bit; Vista / Windows 7 32 bit) 485.17 KB. Seems to fix kyocera cs 3252ci apart. Kyocera printers windows drivers were collected from official websites of manufacturers and other trusted sources. The copystar cs 3252ci cyan tk-8337c, magenta tk-8337m and yellow tk-8337y toner cartridges will each yield an estimated 15,000 pages with 5% page coverage. Kyocera-Mita Toner & Ink at. Welcome to the Kyocera Download Centre. This web based support provides easy access to driver resources, user manuals, installation guides and product documentation. There is also a large variety of network tools and utilities to help you keep your equipment up to date. Windows 10 (32 & 64 bit) Description: Version: File Size: File Name: Info: Fiery Printing System 15: 1.02042967: 120.23 MB Fiery Printing System 15.zip Fiery printer driver for Printing System 15.
Tumblr media
Kyocera Printer Drivers For Mac 10.10
Vibrant Color Black White
KYOCERA Document Solutions France
Scanner Driver Want
KYOCERA CS 3252CI PRINTER DRIVER DETAILS:
Type:DriverFile Name:kyocera_cs_8855.zipFile Size:3.5 MBRating:
4.87
Downloads:70Supported systems:Windows Vista, Windows Vista 64-bit, Windows XP 64-bit, Mac OS X, Mac OS X 10.4, Mac OS X 10.5Price:Free* (*Registration Required)
KYOCERA CS 3252CI PRINTER DRIVER (kyocera_cs_8855.zip)
How to setup printer and scanner konica minolta bizhub c552. There is also a large variety of network tools and utilities to help you keep your equipment up to date. You built your business to satisfy the mounting demands of today s professional world. Remedy, 1 checking the fax pwb the fax pwb. In the categorized downloads or manually. I rebooted the printer and print server but it still wouldnt print a test page so i removed the printer and driver package and reinstalled using kx driver version 5.1.1607 to see if it makes a difference. Code, c0030 description, fax pwb system error causes, the fax processing cannot be continued due to the fax firmware error. Kyocera taskalfa 3252ci scanner driver want to keep using your kyocera taskalfa 3252ci on windows 10?
And white output speeds, documentation. But nitro 12 seems to ensure the ultimate color and easily. Eligible and ready for service agreement. Printing pdf's to kyocera cs 3252ci sign in to follow this.
Seems to fix kyocera cs 3252ci apart. Kyocera printers windows drivers were collected from official websites of manufacturers and other trusted sources. The copystar cs 3252ci cyan tk-8337c , magenta tk-8337m and yellow tk-8337y toner cartridges will each yield an estimated 15,000 pages with 5% page coverage.
Kyocera-Mita Toner & Ink at.
Vibrant color and black and white imaging, advanced technology integration and outstanding ergonomics set the taskalfa 3252ci apart. Drivers eee pc seashell 1015bx Windows vista download. With an excellent value proposition for essential functionality. Official driver packages will help you to restore your kyocera cs 3252ci printers . Download drivers, documentation and software for all your kyocera products from a single place - welcome to the download centre.
The kyocera document solutions france s. Sustainable growth, the 2552ci combines. Express install is a quick way to install a driver and certain features in package form. Print user guide, copiers offer many configurations. Samsung Sch. Everyone can easily create reports and white output. Unlock the possibilities of powerful digital imaging and document solutions with kyocera s copystar 3552ci.
You can change your cookie settings in your web browser settings. Use means any permanent or temporary use of the software and includes the storing, loading, installing, executing or displaying of the software or the processing of any data contained therein. 3252ci sign in vuescan so you want to meet your device. 2020 kyocera document solutions france s.a.s. In the product library window, there are two methods of installation. Keep using your pc s operating system s intuitive, this. Kyocera cs 3252ci scanner driver want to keep using your kyocera cs 3252ci on windows 10?
2020 kyocera document solutions danmark a/s cookies og dit privatliv vi bruger essentielle cookies for at gøre interaktioner med vores website lette og effektive, statistiske cookies for at vi bedre kan forstå hvordan vores website bruges og marketing cookies til at skræddersy reklamer til dig. The branch manager has requested that i set it to default to black and white printing to keep costs down. To download the dvd-image for taskalfa 2551ci ca. Kyocera taskalfa 3252ci printers, enhance security and utilities.
Vibrant Color Black White.
Copystar cs multifunction printers windows 10? Drivers for kyocera mita products can be downloaded from the following link. With custom install is for taskalfa 3212i supports busy workgroups. Express install is no risk of manufacturers and distributed workgroups. Everyone can print fine to the hp printers, but nitro 12 seems to be unable to succesfully print to the kyocera printer.
Vibrant Color Black White.
We have a user manuals, offering document solutions. As the first in a series of innovative and efficient multifunctional printers, the cs 2551ci represents a new era for office technology. But nitro 12 seems to be unable to succesfully print to the kyocera printer. Kyocera now offers to streamline workflows, enhance security and cut costs.
Copystar CS-3252ci MFP, TEC Copier Systems LLC.
Device s operating system and other trusted sources. Kyocera cs 3252ci drivers were collected from official websites of manufacturers and other trusted sources. You built your pc s copystar cs 3252ci apart. We reverse engineered the kyocera taskalfa 3252ci driver and included it in vuescan so you can keep using your old scanner.
I rebooted the next meeting with output. Built on a user- and eco-friendly platform, the network-ready taskalfa 3212i supports busy workgroups with fast print speeds, flexible paper handling and high-quality imaging. Fiery printer driver for printing system 15, 103,35 mb fit101844815 twain scanner driver. Offices can design the copystar cs 3252ci with flexible paper handling, a generous paper capacity, and a variety of finishing capabilities. ACP45EU. Kyocera would also like to provide an overview of best practises if your business has been put into lockdown please ensure the kyocera device is turned off at the switch, not only will this be beneficial to saving power, but this will avoid any toner alerts being sent through and unnecessary deliveries. Unlock the high costs of today s operating system.
About us kyocera document solutions south africa works with businesses, offering document services such as printers, copiers. The device s reliability was exceptional, with no misfeeds or service calls experienced over the duration of its 175,000-im-pression test. Download center how to use the download center. Download latest drivers for kyocera cs 3252ci on windows. Device that will automatically recognizes your kyocera copiers, etc.
Kyocera's taskalfa mfps target businesses rationalising their printer fleet and those tiring of the high costs of outsourcing. DRIVER IMEDIA 1408 WINDOWS 10 DOWNLOAD. Original software will help you to fix device errors with kyocera printers. Ready to find the software on our environment and particle free.
Kyocera taskalfa 3212i driver powerful, scalable and secure, the versatile kyocera taskalfa 3212i black and white multifunctional printer mfp handles your most demanding print, copy and color scan tasks with ease.
Finally, flexible document processing of the print solutions.
Kyocera taskalfa 3252ci a4/a3 colour mfp with 25 page per minute efficiency in a4 for mid-sized workgroups with advanced functionality, usability and customisable solutions.
The driver update utility downloads and installs your drivers quickly and easily.
Kyocera net direct print user guide, kyocera's pdf direct print software utility allows users to send a pdf portable document format file directly to a printer without the need to open the file in adobe acrobat or acrobat reader and print using the print driver.
Install, so i removed the system.
With an altruistic philosophy and a unique management system, the kyocera group emphasizes corporate citizenship through trust among stakeholders, sustainable growth, and a favorable impact on our environment and society.
Express install is a particular type of most up. A low price and robust feature set, as well as its strong overall performance, also make the device an excellent value proposition for small to mid-size workgroups. Drivers ge 97769 dual scroll optical mouse Windows vista. Personalize your black & white or color copier with options in speed, paper size, finishing and features. Dedicated service experts from kyocera will globally support you in installation and daily operations for our products.
With custom install, you select from individual drivers and utilities. To receive instructions how to burn a cd image please klick here. We reverse engineered the kyocera cs 3252ci driver and included it in vuescan so you can keep using your old scanner. The taskalfa 3252ci can easily create reports and prints for the next meeting with output speeds in color and black rated at 32 copies-per-minute. Select the latest driver and white output. Most popular kyocera products from the high costs down. Vibrant color and black and white imaging, advanced technology integration and outstanding ergonomics set the copystar cs 3252ci apart. To find the latest driver, including windows10drivers, choose from our list of most popular kyocera printer downloads or search our driver archive for the driver that fits your specific printer model and your pc s operating system.
Most up-to-date drivers and cut costs down. Select the copystar cs 3252ci, fax processing hub, copiers. Our high-quality, kyocera cs multifunction printers and copiers offer many configurations to meet your needs. We have a new kyocera 3050ci copy/scan/fax/printer. Determine the smtp information for your office 365 account. Driverpack will automatically select and install the required drivers. 000 pages with no risk of powerful office efficiency. Using the most up to date printer driver as well.
Are you using a Kyocera printer or copier/MFP to print from your MAC OSX 10.x? If so, there is a great new driver that makes Kyocera MAC printing a breeze. This version 3 print driver has an updated UI that is simpler to use and they have also added PCL support for convenience.
Taking a closer look at Kyocera MAC printing you’ll notice that many of the advanced options that are available as a walk-up copier have now been incorporated into the printing system. Users will now have full access to advanced color adjustments as well as security features allowing administrators to restrict access to certain functions. With the addition of complex finishing options such as folding and booklet making, MAC users can now enjoy most all of the benefits that their counterpart Windows users have enjoyed for many years.
It is commonly known that most graphic artist users prefer the MAC operating system for its powerful graphics processing. The new version 3 Kyocera MAC printing support enables enhanced adjustments to output and the use of advanced color tables to make foolproof color reproductions of complex jobs. Prior to this version, the only option to produce graphic arts quality prints was with the addition of a FIERY controller. Now the new driver is a far cry from full out Fiery printing, it does give the “light” graphics user a more economical choice to make representative output.
The installation process has also been simplified in the new Kyocera MAC printing environment. With a more plug-and-play setup even the most novice of users can be up and running in minutes without the need for IT or computer support.
Kyocera Universal Print Driver
Owning a MAC no longer has to be a burden. Installing and using the Kyocera MAC printing system has become just as familiar as the Windows users have enjoyed for many years now. Finally a manufacturer that truly understands the need for multiple operating system print drivers has emerged!
To find out more about the MAC print driver and its capabilities, simply download the driver and install on any OSX 10.x system and enjoy the benefits. For further assistance you may always contact us for added support.
Tumblr media
0 notes
yatterzuk · 8 years ago
Text
What’s new in the Windows 10 Creators Update
https://www.youtube.com/embed/h86ZgiGkPCg?version=3&rel=1&fs=1&autohide=2&showsearch=0&showinfo=1&iv_load_policy=1&wmode=transparent
We believe that everyone is a creator at heart and that creativity is an essential human trait. And, no matter who you are, Windows 10 is built to empower the creator in all of us. To show you some of the great new features coming in the Creators Update, we’ve got a special episode of This Week on Windows just for you. New innovations in the Windows 10 Creators Update include 3D in Windows 10, built-in game broadcasting, new tab management features and more in Microsoft Edge, and enhanced security features such as a new Microsoft privacy dashboard.
You can get the Creators Update in a few different ways. If you already have a Windows 10 PC and have automatic updates enabled, the update will be delivered to you when it’s ready. If you are an advanced user and would like to get the update manually, visit this blog post to learn how to get the Creators Update. Another great way to take advantage of the Creators Update is to purchase a new Windows 10 PC from Surface or our partners. Currently, we’ve got some great offers on Windows 10 PCs from Microsoft Store – you can save up to 33% on select PCs, including Dell Inspiron 15, Dell Inspiron 13, HP Pavilion x360, and ASUS ZenBook Flip, at Microsoft Store and microsoftstore.com in the U.S., Canada, and Puerto Rico through April 17.
And, in case you missed it, yesterday we announced new creativity apps with unique capabilities for Surface Dial.
Here’s a more detailed list of what’s new in the Windows 10 Creators Update
3D in Windows 10
Now with the Creators Update, you have a new app called Paint 3D and access to an online creative community at Remix3D.com.
3D in Windows 10 comes to life in the Creators Update to allow anyone to experience, create, and share in a new dimension. With 3D, we can communicate ideas and express ourselves better, and learn faster, because it’s much more representative of the world we live in.
Now with the Creators Update, you have a new app called Paint 3D and access to an online creative community at Remix3D.com. The all-new Paint 3D allows you to create or modify 3D objects, easily change color or texture, or turn 2D images into 3D works of art. To launch Paint 3D, click here.
With Remix3D.com, you can share, discover, and be inspired by millions of 3D objects. Remix3D.com lets you connect with other creators, find new ideas, and get instant access to a library of 3D objects to customize, remix, and share with the creative community.
New features for Windows 10 PC gamers: gamers can share their passion by connecting, streaming and playing together 
https://www.youtube.com/embed/U2LGgmevcZE?version=3&rel=1&fs=1&autohide=2&showsearch=0&showinfo=1&iv_load_policy=1&wmode=transparent
Beam game broadcasting
With the Creators Update, built-in game streaming with Beam is the easiest and most interactive way to stream your gameplay on Windows 10. Pressing Windows key + G while playing your game will bring up the Game bar, where you’ll find we’ve added a broadcast icon to launch Beam – no extra software required.
Built-in game broadcasting on Windows 10. Now you can effortlessly stream your gameplay using the Game Bar—just hit Windows key + G, click Broadcast, and start streaming on Beam—all without the need for additional log-ins.
This offers everyone the opportunity to showcase their creativity as a game broadcaster. And with Beam’s low-latency technology, viewers experience less than a second of delay, enabling broadcasters to engage and interact with their viewers in near real-time. This low-latency technology enables Beam broadcasters to incorporate interactive features, such as animation and sound triggers, right into their streams.
New gaming section in System Settings
Inside the main Windows System Settings, a new section has been added: Gaming, identified with the Xbox logo. This new section unifies your Windows 10 gaming settings in one place. In the Creators Update, there are four settings options: Game bar, GameDVR, broadcasting, and Game Mode. Game Mode may be easily turned on and off for specific games using the Game bar (Windows key + G).
Game Mode
With Game Mode, it’s our goal to provide a better and more consistent gaming experience on Windows 10, by dedicating more system resources to your game. Game Mode also works for both Win32 and UWP games. To enable Game Mode while playing a game, pull up the Game bar (Windows key + G) and click on the Settings button to opt the running game into using Game Mode. The Creators Update is just the first milestone in our commitment to Game Mode and Windows 10 performance improvements for PC gaming.
More games supported by Game bar
In the Windows 10 Creators Update, we’ve continued to expand support for Windows Game bar in full-screen mode to more than 80 of the most popular PC games. You can also now manage this feature in the new Gaming section of Windows Settings. Look for “Game bar,” and make sure the “Show Game bar when I play full-screen games Microsoft has verified” setting is checked. A regularly updated list of supported titles is available here.
To learn more about all the new gaming features available in the Creators Update, head over to Xbox Wire.
Microsoft Edge gets even better with a whole new suite of tab management features, new extensions, and a new bookstore and reading experience
https://www.youtube.com/embed/2wOz9MuwERs?version=3&rel=1&fs=1&autohide=2&showsearch=0&showinfo=1&iv_load_policy=1&wmode=transparent
Microsoft Edge is the faster, more secure browser built for Windows 10, and with the Creators Update, Microsoft Edge is faster than Google Chrome and Mozilla Firefox and offers longer battery life. When unplugged and on-the-go, you can stream video and browse longer. Microsoft Edge streams video up to 3 hours longer than Google Chrome and up to 5 hours longer than Mozilla Firefox, letting you binge watch your favorite show longer without needing a charge. You can also browse nearly a full hour longer with Microsoft Edge when compared to Google Chrome, and nearly two hours longer when compared to Mozilla Firefox.**
Tab preview bar: It’s easy to lose track of what’s in your tabs, especially when you have many tabs from the same site, with similar titles and icons.
Tab preview bar: It’s easy to lose track of what’s in your tabs, especially when you have many tabs from the same site, with similar titles and icons. Tab preview bar allows you to easily glance at a visual preview of every tab you have open without leaving your page. You can scroll through the list with touch, mouse wheel, or a touchpad.
Set tabs aside: We’ve added two new buttons next to your tabs in Microsoft Edge to help you quickly manage all your tabs without losing your flow.
Set tabs aside: We’ve added two new buttons next to your tabs in Microsoft Edge to help you quickly manage all your tabs without losing your flow. Set these tabs aside feature allows you to sweep away your open tabs, giving you the ability to restore them later. And with Tabs you’ve set aside, you can preview thumbnails of web pages you set aside, and restore an individual or a collection of web pages to pick up where you left off.
Import favorites from another browser when you switch to Microsoft Edge: You can import your favorites, browsing history, and other data from another browser you have installed, in one simple step. Use the Import from another browser feature under Settings to select the browsers you want to move your data from.***
Jump List for Microsoft Edge: You can now launch a new window or new InPrivate window for Microsoft Edge straight from its Taskbar icon.
Jump List for Microsoft Edge: You can now launch a new window or new InPrivate window for Microsoft Edge straight from its Taskbar icon. Simply right-click or swipe up on the Microsoft Edge icon in the Taskbar, and pick the task you want!
The Creators Update will also bring more extensions to Microsoft Edge.
The Creators Update will also bring more extensions to Microsoft Edge, including Ebates, Intel TrueKey, Read & Write, Ghostery, and RoboForm, among others.
Tap the pen or highlighter in Web Note, and you’ll now see the full set of Windows Ink colors.
What’s new in the Windows Store with the Creators Update
We’ve added a new digital category in the Windows Store called books (US only) joining games, apps, movies/TV, and music. With books in the Windows Store, you can discover and read e-books from your favorite authors across genres you love – from sci-fi to thrillers, to children’s books, and everything in between.
With books in the Windows Store, you can discover and read e-books from your favorite authors across genres you love – from sci-fi to thrillers, to children’s books, and everything in between.
In the Windows Store, readers will find favorite titles, including New York Times Bestsellers, amongst hundreds of thousands of others. We have partnered with the top publishers and partners, Penguin Random House, Simon & Schuster, HarperCollins Publishers, Hachette Book Group, Houghton Mifflin Harcourt, as well as Ingram Content Group, to bring an extensive catalog of great books to the Windows Store. It will feature content such as Game of Thrones by George R.R. Martin, American Gods by Neil Gaiman, Cross the Line by James Patterson, End of the Watch by Stephen King, and Tools of Titans by Tim Ferriss.
Once you’ve purchased a book from the Windows Store, you can start reading immediately with Microsoft Edge, which supports offline reading without an internet connection.
Once you’ve purchased a book from the Windows Store, you can start reading immediately with Microsoft Edge, which supports offline reading without an internet connection. What’s more, in Microsoft Edge you can easily personalize your reading experience with custom font sizes, layouts, and themes. Cortana* integration pulls information from the web right into your reading experience. Microsoft Edge has integrated Learning Tools accessibility features like Read Aloud and text spacing to make it easier for everyone to read, including people with learning differences like dyslexia and English Language Learners. Books is available across Windows 10 devices, from laptops to 2-in-1s, desktops, and mobile.
Dolby Atmos app for Windows 10 now available in the Windows Store
Additionally, for the first time, once you’re running the Creators Update, you will be able to experience the Dolby Atmos audio experience via the Dolby Access app, available today in the Windows Store. With the app, you will be able to experience immersive audio from a Windows 10 PC running the Creators Update via headphones or an HDMI connection to a Dolby Atmos-enabled sound bar or home theater system. Check out the app today!
A digital assistant that works across devices can now do even more to help you stay on top of everything. Here’s what’s new for Cortana* in the Creators Update.
At work and in life, Cortana is your personal digital assistant, there for you wherever you need her, helping make sure nothing slips through the cracks. With Cortana, it is easier to stay on top of your schedule, your commitments, and all the important things you need to remember to keep your day running smoothly.
Cortana loves music: You can now use Cortana to control music playback on more of your favorite music apps (EN-US only). And Groove now supports the ability to play music by mood, category or activity so you can say “Hey Cortana, play me some workout music” (EN-US only).
We’ve also enabled natural language compatibility for iHeartRadio and TuneIn Radio. This will work both above the lock screen (PC is locked) as well as below! You can try queries like…
Play Drake on iHeartRadio
Play Top 40 on iHeartRadio
Play NPR Hourly News on TuneIn
Play jazz music on TuneIn
Play Z100 on iHeartRadio
Play KUOW on TuneIn
Adding music recognition support to Chinese (Simplified): Cortana can now recognize music for customers in China. Simply tap the music notes icon in the top corner of Cortana’s home page, and Cortana will listen to whatever music is playing and use Netease to tell you what song it is.
Full screen when Idle: When using “Hey Cortana” while your PC is unlocked and idle, you’ll get a full-screen experience that is optimized for viewing from afar. Give it a try by enabling “Hey Cortana”, and then wait for about 10 seconds or so without touching your PC (available in all Cortana markets).
Cortana can help you pick up where you left off: When you switch computers, Cortana will display quick links in the Action Center to help you easily get back into Microsoft Edge websites and SharePoint (or other cloud-based) documents you used most recently.
Cortana can help you pick up where you left off: When you switch computers, Cortana will display quick links in the Action Center to help you easily get back into Microsoft Edge websites and SharePoint (or other cloud-based) documents you used most recently. For example, if you were working on a PowerPoint deck on your laptop, when you later return to your desktop, a link to that deck appears in the Action Center (EN-US only).
Have more fun with improvements across a suite of built-in apps for music, maps, and photos that will work across Xbox and Windows Mixed Reality
Built-in experiences including Windows Photos, Windows Maps, Groove Music, and Movies & TV take advantage of the best capabilities of Windows 10 to help you capture ideas and express yourself.
Use Windows Ink**** to draw on pictures and videos in the Photos app to make them your own. Have fun, express yourself, and create something new with videos and photos that feature your personal touch. Here’s how to get started with inking in the Photos app.
Draw on a 2D or 3D map in the Maps app and make it yours with Windows Ink. Create routes with turn-by-turn directions, measure the distance between any two points, add notes, and mark places to visit. Here’s how to get started with inking in the Maps app.
With Groove, you can upload music from your PC to OneDrive to play your own tunes and make a playlist once for all your devices including Windows, Xbox, Android, iOS, and Sonos.
Fully immerse yourself in 360° videos and watch hit movies and TV shows in 4K or HD with the Movies & TV app.***** You can go directly from playing videos from your own collection to renting or buying hit movies and commercial-free TV shows to watch at home or on the go on your Windows PC or Xbox. And with the Creators Update, you can now explore new immersive 360° video content for the first time from partners like GoPro, Baobab Studios, SLIVER.tv, LIFE VR, and NextVR.
The mini view feature lets you keep an ever-present small window on top of what you’re doing. This means you can do things like binge watch your favorite show, carry on a Skype conversation or control your music, regardless of what else you’re working on.
The mini view feature lets you keep an ever-present small window on top of what you’re doing. This means you can do things like binge watch your favorite show, carry on a Skype conversation or control your music, regardless of what else you’re working on.
You can now lower the amount of blue light emitted from your PC at night with Night light.
You can now lower the amount of blue light emitted from your PC at night with Night light. Settings to turn this functionality on or off in Settings > System > Display.
The Creators Update enables immersive experiences that blur the lines between the physical and digital worlds. It enables developers to create new, exciting Windows Mixed Reality apps and experiences with the recently available Windows Mixed Reality dev kits. Acer, ASUS, Dell, HP, and Lenovo will ship the world’s first Windows Mixed Reality-enabled headsets later this year, starting at just $299 USD.
The most comprehensive security for everything you do on your Windows device – from visiting websites to checking emails to uploading or downloading files in the cloud
The new Windows Defender Security Center dashboard coming with the Windows 10 Creators Update gives you visibility of your device security, health, and online safety.
Windows continues to expand its security features with the Creators Update, which brings, even more, security capabilities to all customers to help better protect, defend, and respond to threats on their devices and networks.
The Windows Defender Security Center offers a single dashboard display so you can control your security options from one place – everything from anti-virus, network, and firewall protection; to assessing your device performance and health; to security controls for your apps and browser; to family safety options. For our enterprise customers using the Windows Defender Advanced Threat Protection (ATP) service, the centralized portal first delivered in the Anniversary Update called the Windows Security Center will link to Office 365 Advanced Threat Protection, via the Microsoft Intelligent Security Graph, to allow IT administrators to easily follow an attack across endpoints and email in a seamless and integrated way.
Dynamic Lock: Windows Hello can use any paired iPhone, Android, or Windows Phone to detect when you step away from your PC or tablet, automatically locking it behind you for an extra measure of security and privacy. This feature works with smartphones, fitness bands, or any device that’s paired to your PC or tablet.
We’re adding new actions and insights in Windows Defender ATP to investigate and respond to network attacks, including sensors in memory, enriched intelligence, and new remediation actions.
Simple privacy settings that let you choose your experience with Windows
A new Microsoft privacy dashboard will let you see and manage your activity data across multiple services, as well as changes to how Windows 10 privacy settings will be designed and featured for customers in the upcoming Creators Update.
The Creators Update introduces a new setup experience for you to choose the settings that are right for you, simplifies Diagnostic data collection from three levels to two: Basic and Full, and further reduces the data collected at the Basic level.
Skype makes it easy for you to connect with friends, family, and colleagues
The Creators Update includes the best Skype ever for Windows PCs. This next-generation version of Skype was built for Windows 10 and includes exclusive features such as mini view, SMS relay for Windows Phone, and Skype Translator for calls to mobile phones and landlines.
The Creators Update includes the best Skype ever for Windows PCs. This next-generation version of Skype was built for Windows 10 and includes exclusive features such as mini view, SMS relay for Windows Phone, and Skype Translator for calls to mobile phones and landlines. It is easy to use with keyboard shortcuts, conversation search, and a redesigned group video calling view that brings everyone even closer together. Be more productive on your PC and collaborate over Skype – share screens, photos, videos, documents, and files (up to 300MB). Say “hello” with an instant message, voice or video call, all for free, no matter what device you use Skype on. Learn more about what’s new with Skype on the Skype Blog.
The Creators Update begins rolling out worldwide today. To learn more about the update you can visit your local Microsoft Store to see what the Creators Update has to offer and get assistance from knowledgeable and friendly Answer Desk technicians, including a free consultation for your device. You can also schedule a free appointment with a Microsoft Store Answer Desk technician by visiting your local Microsoft Store or going online to microsoftstore.com/answerdesk. If you are an advanced user and you’d like to learn more about how to get the Creators Update, visit this link
Cortana available in select markets. More information available here. Microsoft Edge can import browsing history, passwords, and other data only from Internet Explorer and Google Chrome. Favorites can be imported from Google Chrome, Firefox, Internet Explorer and 360. ****Touch–capable tablet or PC required. Pen accessory may be sold separately. *****App availability and experience may vary by region and device; some content sold separately.
The post What’s new in the Windows 10 Creators Update appeared first on Windows Experience Blog.
What’s new in the Windows 10 Creators Update was originally published on Yatterz
0 notes
repwincoml4a0a5 · 8 years ago
Text
Smart devices, stupid mistakes — how to make sure you’re really wiping all that sensitive data
(BigStock Photo)
The past few years have been big for the Internet of Things (IoT), and the future of the connected device industry looks even brighter. Research firm IHS forecasts that the IoT market will grow to 30.7 billion active devices by 2020 and 75.4 billion by 2025. As we continue to witness this tangible shift toward IoT devices, previously futuristic ideas are coming to life all around us and changing the way we experience the world. And while these digital luxuries provide new levels of convenience, the security concerns of connected devices have been well documented. But, what happens when you decide to sell, re-gift, or otherwise dispose of these IoT products? How can you be sure you’re not leaving traces of personal data for the next owner to access.
In this article, I’m going to outline various tips for securely removing your personal information and data, and general security best practices for connected devices. So, let’s start with some of the more obvious scenarios and work our way through other IoT technology.
Computers, Tablets, and Phones Apple Photo)
You’ve decided it’s time to call it a day on your laptop, tablet or smartphone, in favor of an upgrade. What now? First, be sure to backup all your data before firing up that Craigslist ad and making the switch. Cloud accounts make it easy to access your files across a range of devices, and online services for tablets and smartphones will often automatically sync personal data. You should already be saving contingency versions of your important files on a regular basis (for a variety of reasons), but be sure you have backup copies of anything you want to transfer over before getting rid of that old device.
Next, wipe all the data and potentially sensitive settings from your computer’s hard drive, or your tablet or smartphone. There are two things you should consider to securely wipe your devices. First, your files and contact lists aren’t the only things to worry about. Your device likely has many settings that connect to cloud services or might expose things about you to potential new owners. You need to be sure to reset all your device’s settings, too. Second, just “deleting” something from computer storage may not totally remove it. Without going into the specifics, when you delete files or format your hard drive, your computer (or mobile phone) just “forgets” how to find those files; it doesn’t necessarily overwrite them. There are several forensic and recovery tools that can find and restore that data if it hasn’t been overwritten. Securely wiping data may involve overwriting files at least a few times.
The process for securely wiping a device depends on the device itself. Luckily, many phones and tablets are easier to wipe, since some mobile operating systems (OSes) have features built in to handle it for you. For instance, the settings menu on iOS devices allows you to go to General => Reset => Erase All Content and Settings to get rid of all your sensitive data. This feature will either destroy the encryption keys your phone used to secure your data, making that data totally inaccessible, or older iOS versions overwrite that data a few times. It also removes the phone from your iCloud account and Find My Phone. In short, it’s a simple one-button method to security wipe iOS devices.
Android devices can be a bit harder to wipe since there are many variants of this OS, all of which may act differently. Most versions of Android should have a “Factory Data Reset” option. However, in the past researchers found that this was not a secure wipe. Since it didn’t overwrite data on the device, attackers with the right software could recover that data. If you want to really destroy the data on your Android device, it’s best you encrypt it first. Once you encrypt the device and then factory reset, new owners won’t have the keys necessary to read your data.
Finally, for good old-fashioned laptops and desktops, the key is to make sure you overwrite data on your hard drive with a special secure wipe tool. There are many tools out there, including free Windows options like Eraser, that help you make sure data you delete is gone forever. Also note, you may have to follow a different process to securely wipe SSD drives, but there are many instruction guides online.
Although wiping your personal computer, tablet or smartphone is a fairly obvious tip, it’s incredibly important that you take the time to do it properly. Failing to completely reset your old devices can leave your personal data at risk of being discovered by the next user.
Smart Cars 
The automotive industry is becoming more advanced and modern cars now come off the assembly line with Bluetooth hands-free calling, GPS navigation systems, even Wi-Fi. The convenience of having easy access to your phone book, locational data, and favorite apps while behind the wheel is almost too good to turn down. The problem is that as our cars become increasingly sophisticated, they store more of our personal data, just like a PC or smartphone would.
(BigStock Photo).
One step you might forget in all the excitement of selling your old car is removing all that personal information. In fact, I just purchased a used car and found several names and phone numbers archived from the previous owner’s contacts. When the time comes to sell your connected car, be sure to clear all login, contact, and personal data from the settings. If you forget this step, you could be gift wrapping access to your social media accounts, contact list, home address and more for the car’s new owner. Some dealers may be starting to take this into account themselves, but in my case, I did find the previous owners’ stored Bluetooth devices.
As an aside, leaving data behind in rental cars’ Bluetooth systems is another common mistake (as if the rental car process wasn’t enough of a hassle by itself). Whether you’re on a business trip or taking a vacation, if you sync your address book and other data to a rental vehicle, be sure to clear saved numbers, calls and other information before returning it.
By the way, we’ve been talking about this problem in the perspective of the seller avoiding leaving sensitive information for the buyer. However, this issue can also pose risk to buyers, so they can benefit from resetting smart cars. too. Recently, an IBM X-force researcher found that he could still access the car he sold in the car’s app. While the car’s local settings had been cleared, the manufacturer’s cloud had not been. This meant the old owner could still unlock doors, and gain access to the new owner’s car.
Gaming Consoles Xbox One S. (Xbox Photo)
Let’s say you can’t wait to trade in that old Xbox 360 for an Xbox One. Through the years, gaming consoles have become one of the hardest types of devices to attack. This is largely due to increasingly hardened security through hardware and software updates designed to prevent piracy. But don’t be fooled. Although they might be some of the most secure IoT devices on the market, the fact that they’ve evolved to become your one-stop-shop for entertainment means gaming products now save valuable data to their hard drives and SD cards – just like personal computers.
So when it comes time to sell your old console, the main issues are deactivating your online accounts (PlayStation Network, Xbox Live, etc.), and deleting the data on the console. The account deactivation is a basic step, but one many forget. In one case, I bought a used PS3 that still had the previous owner’s PlayStation Network (PSN) account intact. If I hadn’t deactivated the account myself, I could’ve continued buying games with his credentials. You can easily find instructions for deactivating different consoles’ accounts online.
The console will also have menu options to reset them, or delete data. Again, like computers, sometimes a delete isn’t really a complete delete. However, modern consoles, like the new PlayStation offer both a quick and full delete. Be sure to use the full option for a secure wipe.
It’s understandable to be excited to play ‘Halo Wars’ on Xbox One, but make sure you don’t forget to securely wipe your old console before selling it. Mistakes like that can give the next owner access to your personal images, videos, credit card information and even browsing history. That could be game over.
Smart Home Devices
If you’re moving out of your home, consider what connected devices – and data – you might be leaving behind. Some home purchase agreements include caveats that allow the new homeowner to inherit IoT products installed by the previous owner. The procedure for removing your personal data from smart home products like the Nest Thermostat is relatively simple but can be easily forgotten through the moving process. Nest and other smart home products enable you to remove the device from your online account and reset the product, itself, to factory defaults. This should effectively cleanse the device of your information, leaving it ready and waiting for the new user to setup their own account.
Amazon Echo and Google Nest are two examples of smart home devices. (Image via Nest)
Forgetting to wipe the connected home devices you leave behind can leave remnants of your personal information for the home’s new owner to find. Chances are, they’re not secretly a black hat with malicious intent – but unprotected data is still a chilling proposition nonetheless.
Nest products – and other IoT devices in general – have been scrutinized over privacy concerns. While they’re designed to analyze and learn your preferences, they also accumulate usage data and other information that gets sent back to a service provider. But, that’s a whole other ball of wax.
Smart Printers, Copiers, and Other Office Devices (HP Photo)
Smart office devices are exposed to some pretty critical information. Whether it’s a smart copier or digital printer, we’ve heard concerns for years that these devices can save information they encounter. So, when you’re getting rid of that home office printer/copier, how can you be sure that you’re not tossing out years of information for someone else to recover? First, find out if your office device has built-in storage. If it doesn’t, then there’s a good chance none of your information has been saved to the machine. If your printer or copier does include a cache of local data, you can often remove the storage devices, and wipe it in the same way you wipe normal computer storage.
It’s worth noting that some businesses do elect to always remove storage devices from any computing device they sell or recycle. Besides securely erasing this data yourself, you can also give these storage devices to data destruction services, which may even go as far as physically destroying the storage device.
Some higher-end printers include email functionality that allows them to send files via email directly from the printer controls. In order to protect your email address and any others that might be stored on a smart printer, be sure to wipe this data before selling or disposing of it. Most printer manufacturers should have menu options to do so.
Wearables (FitBit Photo)
Smart watches and other wearables like fitness and health trackers have, and will continue to become more engrained in our everyday lives. As a matter of fact, research firm IDC predicts that by 2019, more than 89 million smart wearable units will ship worldwide. That’s a lot of FitBits, Pebbles, Microsoft Bands and Apple Watches!
A recent study by HP Fortify found that many smart watches contain significant vulnerabilities related to privacy, insecure firmware, authentication, and encryption. The study examined ten popular smart watches and found that 90 percent of the time data flowing to and from the watches was easily intercepted.
That said, the bulk of this information storage is somewhere else (in the cloud). While attackers might intercept it in transit, these small, typically resource-light devices don’t tend to store much data locally. If you’re planning to sell or give away any kind of connected wearable device, you do need to make sure it’s factory reset, so that it can no longer connect to its associated cloud account. You probably won’t have to go to much trouble to wipe any local data on these wearables (that said, this will differ from device to device).
General Security Tips for IoT Devices
By their very nature, IoT devices are quite diverse, and thus expose us to a variety of attack profiles. The devices I’m most concerned with today are those that have quickly embedded traditionally known operating systems into non-traditional computing devices without taking security into account. For example, think of a refrigerator, DVR or webcam that’s running a Linux operating system. Since attackers are already familiar with Linux, hacking these types of devices is easy for them. Worse yet, the manufacturers making these devices seem to be years behind in security hardening and development. Furthermore, since these devices are basically just computers, they often have storage full of sensitive information.
The issue of IoT device security has gained a great deal of attention due to the widespread effects of recent Mirai botnet attacks. My hope is that we’ll see more connected device manufacturers incorporate security into their products – from research and development to completion – in the near future.
As far as what you can do to protect your data on an IoT device you sell, I’ll leave you with three important strategies:
Make sure your data is securely wiped from the device. If you’re using a type of IoT device that has a hard drive or local storage, it probably has some data that you need to delete before reselling. However, you need to remember that with computers, not all deletes wipe equally. Do a little research to see if your device’s “factory reset” is a secure wipe or not. If it isn’t, you might have to find alternate means to really kill your data.
Don’t forget the device’s settings. When we think of protecting our data, we normally worry about erasing the sensitive files we might have on a device. However, we can’t forget that many of the settings in an IoT device link to our private data, too. These devices are connected to our cloud and social network accounts, they have a memory of all the access points we’ve connected to, they know your email address, and much more. Make sure you also erase all the device’s settings and deactivate the device from any cloud accounts it might be linked to.
Don’t forget the settings in the cloud, too. Learn from what the X-force researcher discovered about his smart car. Even if you wipe all a device’s local settings, sometimes manufacturers might design features that allow cloud accounts to always have access to the device, unless the account itself gets deactivated and reset. If you can manage a device with a mobile app, be sure that you don’t still have access to the device after factory resetting it.
from DIYS http://ift.tt/2kXyWoj
0 notes
exfrenchdorsl4p0a1 · 8 years ago
Text
Smart devices, stupid mistakes — how to make sure you’re really wiping all that sensitive data
(BigStock Photo)
The past few years have been big for the Internet of Things (IoT), and the future of the connected device industry looks even brighter. Research firm IHS forecasts that the IoT market will grow to 30.7 billion active devices by 2020 and 75.4 billion by 2025. As we continue to witness this tangible shift toward IoT devices, previously futuristic ideas are coming to life all around us and changing the way we experience the world. And while these digital luxuries provide new levels of convenience, the security concerns of connected devices have been well documented. But, what happens when you decide to sell, re-gift, or otherwise dispose of these IoT products? How can you be sure you’re not leaving traces of personal data for the next owner to access.
In this article, I’m going to outline various tips for securely removing your personal information and data, and general security best practices for connected devices. So, let’s start with some of the more obvious scenarios and work our way through other IoT technology.
Computers, Tablets, and Phones Apple Photo)
You’ve decided it’s time to call it a day on your laptop, tablet or smartphone, in favor of an upgrade. What now? First, be sure to backup all your data before firing up that Craigslist ad and making the switch. Cloud accounts make it easy to access your files across a range of devices, and online services for tablets and smartphones will often automatically sync personal data. You should already be saving contingency versions of your important files on a regular basis (for a variety of reasons), but be sure you have backup copies of anything you want to transfer over before getting rid of that old device.
Next, wipe all the data and potentially sensitive settings from your computer’s hard drive, or your tablet or smartphone. There are two things you should consider to securely wipe your devices. First, your files and contact lists aren’t the only things to worry about. Your device likely has many settings that connect to cloud services or might expose things about you to potential new owners. You need to be sure to reset all your device’s settings, too. Second, just “deleting” something from computer storage may not totally remove it. Without going into the specifics, when you delete files or format your hard drive, your computer (or mobile phone) just “forgets” how to find those files; it doesn’t necessarily overwrite them. There are several forensic and recovery tools that can find and restore that data if it hasn’t been overwritten. Securely wiping data may involve overwriting files at least a few times.
The process for securely wiping a device depends on the device itself. Luckily, many phones and tablets are easier to wipe, since some mobile operating systems (OSes) have features built in to handle it for you. For instance, the settings menu on iOS devices allows you to go to General => Reset => Erase All Content and Settings to get rid of all your sensitive data. This feature will either destroy the encryption keys your phone used to secure your data, making that data totally inaccessible, or older iOS versions overwrite that data a few times. It also removes the phone from your iCloud account and Find My Phone. In short, it’s a simple one-button method to security wipe iOS devices.
Android devices can be a bit harder to wipe since there are many variants of this OS, all of which may act differently. Most versions of Android should have a “Factory Data Reset” option. However, in the past researchers found that this was not a secure wipe. Since it didn’t overwrite data on the device, attackers with the right software could recover that data. If you want to really destroy the data on your Android device, it’s best you encrypt it first. Once you encrypt the device and then factory reset, new owners won’t have the keys necessary to read your data.
Finally, for good old-fashioned laptops and desktops, the key is to make sure you overwrite data on your hard drive with a special secure wipe tool. There are many tools out there, including free Windows options like Eraser, that help you make sure data you delete is gone forever. Also note, you may have to follow a different process to securely wipe SSD drives, but there are many instruction guides online.
Although wiping your personal computer, tablet or smartphone is a fairly obvious tip, it’s incredibly important that you take the time to do it properly. Failing to completely reset your old devices can leave your personal data at risk of being discovered by the next user.
Smart Cars 
The automotive industry is becoming more advanced and modern cars now come off the assembly line with Bluetooth hands-free calling, GPS navigation systems, even Wi-Fi. The convenience of having easy access to your phone book, locational data, and favorite apps while behind the wheel is almost too good to turn down. The problem is that as our cars become increasingly sophisticated, they store more of our personal data, just like a PC or smartphone would.
(BigStock Photo).
One step you might forget in all the excitement of selling your old car is removing all that personal information. In fact, I just purchased a used car and found several names and phone numbers archived from the previous owner’s contacts. When the time comes to sell your connected car, be sure to clear all login, contact, and personal data from the settings. If you forget this step, you could be gift wrapping access to your social media accounts, contact list, home address and more for the car’s new owner. Some dealers may be starting to take this into account themselves, but in my case, I did find the previous owners’ stored Bluetooth devices.
As an aside, leaving data behind in rental cars’ Bluetooth systems is another common mistake (as if the rental car process wasn’t enough of a hassle by itself). Whether you’re on a business trip or taking a vacation, if you sync your address book and other data to a rental vehicle, be sure to clear saved numbers, calls and other information before returning it.
By the way, we’ve been talking about this problem in the perspective of the seller avoiding leaving sensitive information for the buyer. However, this issue can also pose risk to buyers, so they can benefit from resetting smart cars. too. Recently, an IBM X-force researcher found that he could still access the car he sold in the car’s app. While the car’s local settings had been cleared, the manufacturer’s cloud had not been. This meant the old owner could still unlock doors, and gain access to the new owner’s car.
Gaming Consoles Xbox One S. (Xbox Photo)
Let’s say you can’t wait to trade in that old Xbox 360 for an Xbox One. Through the years, gaming consoles have become one of the hardest types of devices to attack. This is largely due to increasingly hardened security through hardware and software updates designed to prevent piracy. But don’t be fooled. Although they might be some of the most secure IoT devices on the market, the fact that they’ve evolved to become your one-stop-shop for entertainment means gaming products now save valuable data to their hard drives and SD cards – just like personal computers.
So when it comes time to sell your old console, the main issues are deactivating your online accounts (PlayStation Network, Xbox Live, etc.), and deleting the data on the console. The account deactivation is a basic step, but one many forget. In one case, I bought a used PS3 that still had the previous owner’s PlayStation Network (PSN) account intact. If I hadn’t deactivated the account myself, I could’ve continued buying games with his credentials. You can easily find instructions for deactivating different consoles’ accounts online.
The console will also have menu options to reset them, or delete data. Again, like computers, sometimes a delete isn’t really a complete delete. However, modern consoles, like the new PlayStation offer both a quick and full delete. Be sure to use the full option for a secure wipe.
It’s understandable to be excited to play ‘Halo Wars’ on Xbox One, but make sure you don’t forget to securely wipe your old console before selling it. Mistakes like that can give the next owner access to your personal images, videos, credit card information and even browsing history. That could be game over.
Smart Home Devices
If you’re moving out of your home, consider what connected devices – and data – you might be leaving behind. Some home purchase agreements include caveats that allow the new homeowner to inherit IoT products installed by the previous owner. The procedure for removing your personal data from smart home products like the Nest Thermostat is relatively simple but can be easily forgotten through the moving process. Nest and other smart home products enable you to remove the device from your online account and reset the product, itself, to factory defaults. This should effectively cleanse the device of your information, leaving it ready and waiting for the new user to setup their own account.
Amazon Echo and Google Nest are two examples of smart home devices. (Image via Nest)
Forgetting to wipe the connected home devices you leave behind can leave remnants of your personal information for the home’s new owner to find. Chances are, they’re not secretly a black hat with malicious intent – but unprotected data is still a chilling proposition nonetheless.
Nest products – and other IoT devices in general – have been scrutinized over privacy concerns. While they’re designed to analyze and learn your preferences, they also accumulate usage data and other information that gets sent back to a service provider. But, that’s a whole other ball of wax.
Smart Printers, Copiers, and Other Office Devices (HP Photo)
Smart office devices are exposed to some pretty critical information. Whether it’s a smart copier or digital printer, we’ve heard concerns for years that these devices can save information they encounter. So, when you’re getting rid of that home office printer/copier, how can you be sure that you’re not tossing out years of information for someone else to recover? First, find out if your office device has built-in storage. If it doesn’t, then there’s a good chance none of your information has been saved to the machine. If your printer or copier does include a cache of local data, you can often remove the storage devices, and wipe it in the same way you wipe normal computer storage.
It’s worth noting that some businesses do elect to always remove storage devices from any computing device they sell or recycle. Besides securely erasing this data yourself, you can also give these storage devices to data destruction services, which may even go as far as physically destroying the storage device.
Some higher-end printers include email functionality that allows them to send files via email directly from the printer controls. In order to protect your email address and any others that might be stored on a smart printer, be sure to wipe this data before selling or disposing of it. Most printer manufacturers should have menu options to do so.
Wearables (FitBit Photo)
Smart watches and other wearables like fitness and health trackers have, and will continue to become more engrained in our everyday lives. As a matter of fact, research firm IDC predicts that by 2019, more than 89 million smart wearable units will ship worldwide. That’s a lot of FitBits, Pebbles, Microsoft Bands and Apple Watches!
A recent study by HP Fortify found that many smart watches contain significant vulnerabilities related to privacy, insecure firmware, authentication, and encryption. The study examined ten popular smart watches and found that 90 percent of the time data flowing to and from the watches was easily intercepted.
That said, the bulk of this information storage is somewhere else (in the cloud). While attackers might intercept it in transit, these small, typically resource-light devices don’t tend to store much data locally. If you’re planning to sell or give away any kind of connected wearable device, you do need to make sure it’s factory reset, so that it can no longer connect to its associated cloud account. You probably won’t have to go to much trouble to wipe any local data on these wearables (that said, this will differ from device to device).
General Security Tips for IoT Devices
By their very nature, IoT devices are quite diverse, and thus expose us to a variety of attack profiles. The devices I’m most concerned with today are those that have quickly embedded traditionally known operating systems into non-traditional computing devices without taking security into account. For example, think of a refrigerator, DVR or webcam that’s running a Linux operating system. Since attackers are already familiar with Linux, hacking these types of devices is easy for them. Worse yet, the manufacturers making these devices seem to be years behind in security hardening and development. Furthermore, since these devices are basically just computers, they often have storage full of sensitive information.
The issue of IoT device security has gained a great deal of attention due to the widespread effects of recent Mirai botnet attacks. My hope is that we’ll see more connected device manufacturers incorporate security into their products – from research and development to completion – in the near future.
As far as what you can do to protect your data on an IoT device you sell, I’ll leave you with three important strategies:
Make sure your data is securely wiped from the device. If you’re using a type of IoT device that has a hard drive or local storage, it probably has some data that you need to delete before reselling. However, you need to remember that with computers, not all deletes wipe equally. Do a little research to see if your device’s “factory reset” is a secure wipe or not. If it isn’t, you might have to find alternate means to really kill your data.
Don’t forget the device’s settings. When we think of protecting our data, we normally worry about erasing the sensitive files we might have on a device. However, we can’t forget that many of the settings in an IoT device link to our private data, too. These devices are connected to our cloud and social network accounts, they have a memory of all the access points we’ve connected to, they know your email address, and much more. Make sure you also erase all the device’s settings and deactivate the device from any cloud accounts it might be linked to.
Don’t forget the settings in the cloud, too. Learn from what the X-force researcher discovered about his smart car. Even if you wipe all a device’s local settings, sometimes manufacturers might design features that allow cloud accounts to always have access to the device, unless the account itself gets deactivated and reset. If you can manage a device with a mobile app, be sure that you don’t still have access to the device after factory resetting it.
from DIYS http://ift.tt/2kXyWoj
0 notes
repwinpril9y0a1 · 8 years ago
Text
Smart devices, stupid mistakes — how to make sure you’re really wiping all that sensitive data
(BigStock Photo)
The past few years have been big for the Internet of Things (IoT), and the future of the connected device industry looks even brighter. Research firm IHS forecasts that the IoT market will grow to 30.7 billion active devices by 2020 and 75.4 billion by 2025. As we continue to witness this tangible shift toward IoT devices, previously futuristic ideas are coming to life all around us and changing the way we experience the world. And while these digital luxuries provide new levels of convenience, the security concerns of connected devices have been well documented. But, what happens when you decide to sell, re-gift, or otherwise dispose of these IoT products? How can you be sure you’re not leaving traces of personal data for the next owner to access.
In this article, I’m going to outline various tips for securely removing your personal information and data, and general security best practices for connected devices. So, let’s start with some of the more obvious scenarios and work our way through other IoT technology.
Computers, Tablets, and Phones Apple Photo)
You’ve decided it’s time to call it a day on your laptop, tablet or smartphone, in favor of an upgrade. What now? First, be sure to backup all your data before firing up that Craigslist ad and making the switch. Cloud accounts make it easy to access your files across a range of devices, and online services for tablets and smartphones will often automatically sync personal data. You should already be saving contingency versions of your important files on a regular basis (for a variety of reasons), but be sure you have backup copies of anything you want to transfer over before getting rid of that old device.
Next, wipe all the data and potentially sensitive settings from your computer’s hard drive, or your tablet or smartphone. There are two things you should consider to securely wipe your devices. First, your files and contact lists aren’t the only things to worry about. Your device likely has many settings that connect to cloud services or might expose things about you to potential new owners. You need to be sure to reset all your device’s settings, too. Second, just “deleting” something from computer storage may not totally remove it. Without going into the specifics, when you delete files or format your hard drive, your computer (or mobile phone) just “forgets” how to find those files; it doesn’t necessarily overwrite them. There are several forensic and recovery tools that can find and restore that data if it hasn’t been overwritten. Securely wiping data may involve overwriting files at least a few times.
The process for securely wiping a device depends on the device itself. Luckily, many phones and tablets are easier to wipe, since some mobile operating systems (OSes) have features built in to handle it for you. For instance, the settings menu on iOS devices allows you to go to General => Reset => Erase All Content and Settings to get rid of all your sensitive data. This feature will either destroy the encryption keys your phone used to secure your data, making that data totally inaccessible, or older iOS versions overwrite that data a few times. It also removes the phone from your iCloud account and Find My Phone. In short, it’s a simple one-button method to security wipe iOS devices.
Android devices can be a bit harder to wipe since there are many variants of this OS, all of which may act differently. Most versions of Android should have a “Factory Data Reset” option. However, in the past researchers found that this was not a secure wipe. Since it didn’t overwrite data on the device, attackers with the right software could recover that data. If you want to really destroy the data on your Android device, it’s best you encrypt it first. Once you encrypt the device and then factory reset, new owners won’t have the keys necessary to read your data.
Finally, for good old-fashioned laptops and desktops, the key is to make sure you overwrite data on your hard drive with a special secure wipe tool. There are many tools out there, including free Windows options like Eraser, that help you make sure data you delete is gone forever. Also note, you may have to follow a different process to securely wipe SSD drives, but there are many instruction guides online.
Although wiping your personal computer, tablet or smartphone is a fairly obvious tip, it’s incredibly important that you take the time to do it properly. Failing to completely reset your old devices can leave your personal data at risk of being discovered by the next user.
Smart Cars 
The automotive industry is becoming more advanced and modern cars now come off the assembly line with Bluetooth hands-free calling, GPS navigation systems, even Wi-Fi. The convenience of having easy access to your phone book, locational data, and favorite apps while behind the wheel is almost too good to turn down. The problem is that as our cars become increasingly sophisticated, they store more of our personal data, just like a PC or smartphone would.
(BigStock Photo).
One step you might forget in all the excitement of selling your old car is removing all that personal information. In fact, I just purchased a used car and found several names and phone numbers archived from the previous owner’s contacts. When the time comes to sell your connected car, be sure to clear all login, contact, and personal data from the settings. If you forget this step, you could be gift wrapping access to your social media accounts, contact list, home address and more for the car’s new owner. Some dealers may be starting to take this into account themselves, but in my case, I did find the previous owners’ stored Bluetooth devices.
As an aside, leaving data behind in rental cars’ Bluetooth systems is another common mistake (as if the rental car process wasn’t enough of a hassle by itself). Whether you’re on a business trip or taking a vacation, if you sync your address book and other data to a rental vehicle, be sure to clear saved numbers, calls and other information before returning it.
By the way, we’ve been talking about this problem in the perspective of the seller avoiding leaving sensitive information for the buyer. However, this issue can also pose risk to buyers, so they can benefit from resetting smart cars. too. Recently, an IBM X-force researcher found that he could still access the car he sold in the car’s app. While the car’s local settings had been cleared, the manufacturer’s cloud had not been. This meant the old owner could still unlock doors, and gain access to the new owner’s car.
Gaming Consoles Xbox One S. (Xbox Photo)
Let’s say you can’t wait to trade in that old Xbox 360 for an Xbox One. Through the years, gaming consoles have become one of the hardest types of devices to attack. This is largely due to increasingly hardened security through hardware and software updates designed to prevent piracy. But don’t be fooled. Although they might be some of the most secure IoT devices on the market, the fact that they’ve evolved to become your one-stop-shop for entertainment means gaming products now save valuable data to their hard drives and SD cards – just like personal computers.
So when it comes time to sell your old console, the main issues are deactivating your online accounts (PlayStation Network, Xbox Live, etc.), and deleting the data on the console. The account deactivation is a basic step, but one many forget. In one case, I bought a used PS3 that still had the previous owner’s PlayStation Network (PSN) account intact. If I hadn’t deactivated the account myself, I could’ve continued buying games with his credentials. You can easily find instructions for deactivating different consoles’ accounts online.
The console will also have menu options to reset them, or delete data. Again, like computers, sometimes a delete isn’t really a complete delete. However, modern consoles, like the new PlayStation offer both a quick and full delete. Be sure to use the full option for a secure wipe.
It’s understandable to be excited to play ‘Halo Wars’ on Xbox One, but make sure you don’t forget to securely wipe your old console before selling it. Mistakes like that can give the next owner access to your personal images, videos, credit card information and even browsing history. That could be game over.
Smart Home Devices
If you’re moving out of your home, consider what connected devices – and data – you might be leaving behind. Some home purchase agreements include caveats that allow the new homeowner to inherit IoT products installed by the previous owner. The procedure for removing your personal data from smart home products like the Nest Thermostat is relatively simple but can be easily forgotten through the moving process. Nest and other smart home products enable you to remove the device from your online account and reset the product, itself, to factory defaults. This should effectively cleanse the device of your information, leaving it ready and waiting for the new user to setup their own account.
Amazon Echo and Google Nest are two examples of smart home devices. (Image via Nest)
Forgetting to wipe the connected home devices you leave behind can leave remnants of your personal information for the home’s new owner to find. Chances are, they’re not secretly a black hat with malicious intent – but unprotected data is still a chilling proposition nonetheless.
Nest products – and other IoT devices in general – have been scrutinized over privacy concerns. While they’re designed to analyze and learn your preferences, they also accumulate usage data and other information that gets sent back to a service provider. But, that’s a whole other ball of wax.
Smart Printers, Copiers, and Other Office Devices (HP Photo)
Smart office devices are exposed to some pretty critical information. Whether it’s a smart copier or digital printer, we’ve heard concerns for years that these devices can save information they encounter. So, when you’re getting rid of that home office printer/copier, how can you be sure that you’re not tossing out years of information for someone else to recover? First, find out if your office device has built-in storage. If it doesn’t, then there’s a good chance none of your information has been saved to the machine. If your printer or copier does include a cache of local data, you can often remove the storage devices, and wipe it in the same way you wipe normal computer storage.
It’s worth noting that some businesses do elect to always remove storage devices from any computing device they sell or recycle. Besides securely erasing this data yourself, you can also give these storage devices to data destruction services, which may even go as far as physically destroying the storage device.
Some higher-end printers include email functionality that allows them to send files via email directly from the printer controls. In order to protect your email address and any others that might be stored on a smart printer, be sure to wipe this data before selling or disposing of it. Most printer manufacturers should have menu options to do so.
Wearables (FitBit Photo)
Smart watches and other wearables like fitness and health trackers have, and will continue to become more engrained in our everyday lives. As a matter of fact, research firm IDC predicts that by 2019, more than 89 million smart wearable units will ship worldwide. That’s a lot of FitBits, Pebbles, Microsoft Bands and Apple Watches!
A recent study by HP Fortify found that many smart watches contain significant vulnerabilities related to privacy, insecure firmware, authentication, and encryption. The study examined ten popular smart watches and found that 90 percent of the time data flowing to and from the watches was easily intercepted.
That said, the bulk of this information storage is somewhere else (in the cloud). While attackers might intercept it in transit, these small, typically resource-light devices don’t tend to store much data locally. If you’re planning to sell or give away any kind of connected wearable device, you do need to make sure it’s factory reset, so that it can no longer connect to its associated cloud account. You probably won’t have to go to much trouble to wipe any local data on these wearables (that said, this will differ from device to device).
General Security Tips for IoT Devices
By their very nature, IoT devices are quite diverse, and thus expose us to a variety of attack profiles. The devices I’m most concerned with today are those that have quickly embedded traditionally known operating systems into non-traditional computing devices without taking security into account. For example, think of a refrigerator, DVR or webcam that’s running a Linux operating system. Since attackers are already familiar with Linux, hacking these types of devices is easy for them. Worse yet, the manufacturers making these devices seem to be years behind in security hardening and development. Furthermore, since these devices are basically just computers, they often have storage full of sensitive information.
The issue of IoT device security has gained a great deal of attention due to the widespread effects of recent Mirai botnet attacks. My hope is that we’ll see more connected device manufacturers incorporate security into their products – from research and development to completion – in the near future.
As far as what you can do to protect your data on an IoT device you sell, I’ll leave you with three important strategies:
Make sure your data is securely wiped from the device. If you’re using a type of IoT device that has a hard drive or local storage, it probably has some data that you need to delete before reselling. However, you need to remember that with computers, not all deletes wipe equally. Do a little research to see if your device’s “factory reset” is a secure wipe or not. If it isn’t, you might have to find alternate means to really kill your data.
Don’t forget the device’s settings. When we think of protecting our data, we normally worry about erasing the sensitive files we might have on a device. However, we can’t forget that many of the settings in an IoT device link to our private data, too. These devices are connected to our cloud and social network accounts, they have a memory of all the access points we’ve connected to, they know your email address, and much more. Make sure you also erase all the device’s settings and deactivate the device from any cloud accounts it might be linked to.
Don’t forget the settings in the cloud, too. Learn from what the X-force researcher discovered about his smart car. Even if you wipe all a device’s local settings, sometimes manufacturers might design features that allow cloud accounts to always have access to the device, unless the account itself gets deactivated and reset. If you can manage a device with a mobile app, be sure that you don’t still have access to the device after factory resetting it.
from DIYS http://ift.tt/2kXyWoj
0 notes