Buying and selling second-hand devices Buying and selling second-hand devices How to erase the personal data from your phone, tablets, and other devices (and why it's important when you're buying and selling them). Read More June 4, 2024 1 minute read How to erase the personal data from your phone, tablets, and other devices (and why it’s important when you’re buying and selling them). Read More About The Author Read moreBuilding cyber skills and roles from CyBOK foundations See author's posts Related Post navigation Previous: Hackers Actively Exploiting Checkpoint 0-Day FlawNext: Russians Love YouTube. That’s a Problem for the Kremlin Related Stories Hackers Exploit React2Shell to Hijack Web Traffic via Compromised NGINX Servers Security Aid February 5, 2026 0 Hackers compromise NGINX servers to redirect user traffic Security Aid February 4, 2026 0 Critical n8n flaws disclosed along with public exploits Security Aid February 4, 2026 0