Data destroyed on lost mobile phones

UK firm Virtuity has developed...

UK firm Virtuity has developed technology to remotely destroy data on lost or stolen mobile phones.

BackStopp Mobile uses the mobile's communications to track it down. Once the device has been traced, BackStopp deletes information.

As soon as the data is wiped out, BackStopp creates a report detailing what was erased, when, and can even pinpoint the location of the device.

The company's website claims the report can include a photograph of the thief.

BackStopp locates the device using GSM and WiFi communications.

The initial BackStopp Mobile release supports all devices running on the Windows Mobile operating system. This includes devices where a business application is in use.

Development work for devices running Nokia's Symbian operating system (OS) has started. Symbian is the most widely used OS.

Virtuity already sells similar technology for laptop PCs. Virtuity recently announced a significant upgrade to its core laptop location tracking and data protection application. This includes encryption integration, wireless and RFID integration, HR system integration and OS destruction.

Police forces using the Airwave mobile communications system have a similar remote data destruction system for lost or stolen mobile devices.



Enjoy the benefits of CW+ membership, learn more and join.

Read more on Voice networking and VoIP



Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:




  • Dissecting the Hack

    In this excerpt from chapter three of Dissecting the Hack: The V3RB0TEN Network, authors Jayson E. Street, Kristin Sims and Brian...

  • Digital Identity Management

    In this excerpt of Digital Identity Management, authors Maryline Laurent and Samia Bousefrane discuss principles of biometrics ...

  • Becoming a Global Chief Security Executive Officer

    In this excerpt of Becoming a Global Chief Security Executive Officer: A How to Guide for Next Generation Security Leaders, ...