10th Indian Delegation to Dubai, Gitex & Expand North Star – World’s Largest Startup Investor Connect
Cyber Security

How to manage deleted files on iOS, iPadOS, and macOS


Most of the time when you delete a file, it’s actually not wiped from existence immediately — as recently discovered by a man whose wife came across illicit texts he’d been sending (and which he thought he had got rid of on his iPhone). The man is now suing Apple.

Marital infidelity aside, the safety net that’s put in place for deleted files can help you recover data you’ve erased in error — however, it can also leave your data exposed to other people (if you’re selling a device, for example). It’s important to know where your deleted files are and how to get them back or erase them permanently.

Checking sync status

Before you try to delete any files, you should check your iCloud syncing status.
Screenshot: Apple

By default, all of the Apple devices you’re signed in to with your Apple ID should be syncing files through iCloud, but it’s worth double-checking — otherwise, you can be leaving files you thought you’d deleted.

  • Open Settings, then tap your name at the top and then iCloud.
  • Under Saved to iCloud, you should see entries for Photos, iCloud Drive, iCloud Mail, and the other apps that make use of iCloud (which is probably most of the ones you’ve got installed).  
  • Select See All for a list of all of your apps and whether they are synced.
  • To make sure files are deleted across the board, keep sync switched on.
  • Open System Settings via the Apple menu, then your name > iCloud
  • As on mobile, the Photos and iCloud Drive entries should be switched on. You can find other apps (like Messages, Contacts, Calendar, and Safari) by clicking Show More Apps or Show All (depending on your version of macOS).
  • Tap the iCloud Drive entry to see if you’re syncing your desktop and documents folders, and to see which apps iCloud is and isn’t syncing from your Mac.

Deleting files on iOS and iPadOS

The Photos app has its own Recently Deleted folder (under Utilities).
Screenshot: Apple

Photos and videos can be recovered or permanently erased.
Screenshot: Apple

Any file you delete from your iPhone or iPad goes to the Recently Deleted folder for 30 days before being permanently wiped. To find the folder, open up the Files app, then tap Browse and Recently Deleted.

  • Tap and hold on any item to bring up the options for Delete Now (erase it forever) and Recover (restore it to its previous place).
  • To select multiple files, tap the three dots (top right), then Select. As you make your choice, Recover and Delete options show up below.

If you’ve deleted a photo or video through the Photos app, it has its own Recently Deleted folder that’s separate, though the same 30-day window applies.

  • Open Photos on your iPhone or iPad, then scroll down to and tap Utilities > Recently Deleted (iOS) or just Recently Deleted from the left-hand navigation pane (iPadOS).
  • Tap on any photo or video to bring up options to Recover the file (put it back where it was) or Delete the file (permanently erase it).
  • To select multiple items, tap the Select button (top right), then tap the three dots on the lower right corner to bring up the Recover and Delete options.

If you are syncing everything through iCloud, all of these changes will be applied on your other devices, too, including permanent deletions and file recoveries.

Deleting files on macOS

You can opt to have the macOS Trash auto-empty after 30 days.
Screenshot: Apple

When you delete a file on your Mac, it goes to the Trash folder.

  • You can open Trash from the dock or from Finder (choose Go > Go to Folder, then search for “trash”). 
  • If you’d rather permanently delete a file the first time around, highlight the file or files in the Finder, use the Option+Cmd+Delete keyboard shortcut, and confirm your choice when the dialog box pops up.

Files usually stay in the Trash until you manually empty them. 

  • To delete one or more files in Finder, Ctrl+click on them and pick Delete Immediately
  • To empty everything out of the Trash at once, click Empty (top right). 
  • You can also click and hold (or right-click) on the Trash icon in the dock, and then pick Empty Trash.

If you prefer, you can have macOS automatically clean up files after they’ve been in the Trash for a month.

  • Open the Finder menu and select Settings.
  • Under Advanced, check the Remove items from the Trash after 30 days.

As on iPhones and iPads, the Photos app has its own Trash folder, called Recently Deleted. Deleted photos and videos stay here for 30 days before being fully erased.

  • From the macOS Photos app, click Recently Deleted on the left. (Note: if you don’t have any recently deleted photos, you won’t see the folder.)
  • Choose Delete All to permanently wipe everything in the folder.
  • To bring back or wipe individual files, select them as needed, and the Recover and Delete buttons will become active in the top-right corner.

Again, all of these changes will be synced to other devices via iCloud, if you’ve enabled it. The only exceptions would be file changes in folders on your Mac that iCloud doesn’t cover (head back to the instructions in the first section to check).

Finding deleted files and apps in iCloud

iCloud on the web gives you another place to find deleted files.
Screenshot: Apple

If you go to iCloud on the web, you won’t find anything different from what you can already see on your iPhone, iPad, or Mac in terms of deleted files. However, you might find it easier to check up on them from here.

  • Click Drive > Recently Deleted to see files that have been recently deleted across your devices, as well as how long is left before they’re permanently erased. Use the Recover and Delete buttons underneath to restore or wipe them.
  • Click Photos and then Recently Deleted to see photos and videos that have been deleted in the last 30 days. Here, the Recover and Delete buttons are in the top right corner.

Finally, bear in mind that other apps across the Apple ecosystem have their own folders of recently deleted items, usually with the same 30-day time limit. Apple Mail and Apple Notes, for example, have their own trash folders where you can view deleted items, restore them, or erase them forever.



Source link

by 9to5mac

As the world becomes more digital, the requirement for cyber defense has never been greater. As businesses, governments, and citizens depend greatly on technology, the cybersecurity practice is expanding very quickly in 2025. From data theft to ransomware attacks, the danger has evolved to be sophisticated, forcing companies to invest in innovative cybersecurity measures. Consequently, career prospects in this area are flourishing. Whether you are a student, IT personnel, or an individual thinking of changing their vocation, learning the cybersecurity scope in the future will prepare you for a very rewarding and sought-after profession. Why Cyber Security Matters More Than Ever With sudden digitization in all sectors, cyberattacks have also kept pace. Be it any organization, a small startup, or a multinational corporation, everything is now a cybercriminal target. With increasing threats, the scope of cybersecurity widens to include everything from network security to cloud security and ethical hacking. In 2025, cybersecurity is no longer an IT problem — it’s a business necessity. This evolution guarantees that experts with cybersecurity knowledge will continue to be in greater demand.  Cyber Security Scope in India: Rising Demand and Opportunities   India is one of the fastest-growing digital economies and is seeing a higher demand for cyber protection. The government is promoting initiatives like Digital India, and more businesses are going online. As a result, the cybersecurity scope in India has expanded significantly. Every sector, from banking and healthcare to e-commerce and education, is vulnerable to cyber threats.   Major Indian cities like Bangalore, Hyderabad, Pune, and Delhi are becoming hubs for cybersecurity. They offer attractive job roles and competitive salary packages to skilled professionals.   Key Areas Expanding Cyber Security Scope in the Future   Here are the major areas contributing to the growing scope of cybersecurity in the future:   1. Cloud Security   As companies move to cloud platforms like AWS, Azure, and Google Cloud, protecting data on these platforms is crucial.   2. IoT Security   As smart devices increase, so do vulnerabilities. IoT security ensures that everything from smart homes to industrial sensors is protected.   3. AI and Machine Learning in Cyber Security   Artificial intelligence is used to detect threats in real time, predict attacks, and automate responses. This technology is reshaping the scope of cybersecurity dramatically.   4. Blockchain Security   With the rise of Web3 and decentralized finance (DeFi), blockchain security is becoming an important area within the future scope of cybersecurity. Careers in Cyber Security (2025) The increasing cybersecurity scope in India has created many exciting job roles across industries. Below you will see some high-demand roles in 2025: Job Roles  Average Security salary (per annum)  Security Analyst ₹6–8 Lakhs Penetration Tester (Ethical Hacker) ₹8–12 Lakhs Cyber Security Consultant ₹10–15 Lakhs Security Architect ₹20–25 Lakhs Chief Information Security Officer (CISO) ₹40 Lakhs and above Each of these job roles contributes in its unique way to bolster the total digital defense of an organization, further expanding the cybersecurity scope nationally and globally. In-Demand Skills for Cybersecurity Roles You will need a strong skillset, both technical and …

by Team SNFYI

As senior citizens embrace the digital age, they are finding themselves at a greater risk than ever before. With unfamiliar technology and fast-evolving fraud tactics, it’s no surprise that more and more cybercrime victims are over 50—many losing not just money, but their sense of security and trust.  In response to this growing crisis, Truecaller, the leading global communications platform, has announced a transformative partnership with Khyaal, India’s number one app for senior citizens, committed to the empowerment and well-being of India’s elderly. This collaboration uniquely blends Khyaal’s deep understanding of seniors and expertise in creating meaningful engagement, along with Truecaller’s cutting-edge caller identification technology. Together, they create a robust and secure shield that fosters trusted, reliable communication, building a safer and more connected community for India’s elderly population.  All Khyaal members will receive an exclusive 50% discount on Truecaller Premium membership, ensuring they have access to the most advanced caller identification and spam protection features. Additionally, as part of this comprehensive safety initiative, Khyaal and Truecaller will co-create dedicated educational content. This includes “New Scam Highlights” sessions that decode emerging fraud tactics, interactive “Spot the Scam” workshops and contests, essential guidelines for handling calls from unknown numbers, and powerful testimonials from Khyaal seniors who have successfully identified and avoided scam attempts. These initiatives will be delivered through a mix of digital and on-ground formats. Seniors will have access to the workshops and sessions on the Khyaal app. The partnership will extend beyond digital boundaries through Khyaal’s “50Above50″ event, featuring interactive awareness sessions and dedicated safety booths that offer seniors practical, hands-on education and insights on digital safety.” While the free version of Truecaller is also functional, the Premium subscription includes enhanced spam blocking and several advanced safety features which can better protect senior citizens against fraudulent and unwanted communication. This technology-driven approach provides an additional layer of prevention, complementing Khyaal’s ongoing efforts to empower seniors through education and solutions to create a safer world for seniors. “The digital age holds tremendous promise for our seniors—offering connection, convenience, and community. But it also brings new threats they’re often unprepared for,” said Rishit Jhunjhunwala, Global CEO, Truecaller. “We’ve heard far too many heartbreaking stories of older individuals duped by scams. Our partnership with Khyaal is a meaningful step toward equipping them with the knowledge and tools to navigate this landscape safely.” Commenting on the partnership, Hemanshu Jain, Founder & CEO, Khyaal said, “The statistics are deeply concerning: seniors are losing their hard-earned savings to increasingly sophisticated scammers who exploit their trust and unfamiliarity with digital fraud tactics. The emotional toll of falling victim to such scams can be devastating, often leading to anxiety and a loss of confidence in using digital tools. At Khyaal, we’ve long recognised this silent crisis and have been committed to raising awareness through digital workshops. This partnership with Truecaller takes that commitment further. By learning to identify red flags, equipping themselves with the right tools like Truecaller, and staying informed about emerging scam tactics, seniors can maintain their independence while protecting themselves …

by Team SNFYI

For years, global supply chains have operated on a fundamental faith: that if materials are moving, everything is working. That approach worked — until cybersecurity threats became not only routine, but sophisticated and devastating. Data leaks and ransomware are no longer affecting individual businesses due to the emergence of advanced persistent threats. They send ripples through supply networks and have an impact on national security, financial systems, and basic services. This is particularly true for industries linked to government contracts. Where sensitive defense information passes through hundreds of subcontractors, an individual organization’s approach to security becomes a part of the broader risk. This isn’t just about protecting one company’s data — it’s about protecting entire ecosystems. Acknowledging this, the Department of Defense of the United States introduced a framework-based cybersecurity certification model. Among these, the Cybersecurity Maturity Model Certification — CMMC — is a key cornerstone in the effort to reform how government supply chains can operate securely. With ever-changing policy developments and recent announcements, CMMC updates are now shaking up the landscape for contractors, suppliers, and service providers. Why CMMC News Matters In The Current Scenario The cybersecurity environment for federal contractors is changing. The DoD’s implementation of CMMC, first announced in 2020, remains a work in progress. Changes, updates, and policy updates all mean companies need to be watching the CMMC news to stay compliant. CMMC implements a tiered approach for cybersecurity requirements for businesses doing business with the DoD that have access to FCI and CUI. Unlike self-attestation models, CMMC requires third-party assessments, especially for businesses participating in higher-risk jobs. Recent news updates have included: These shifts are not optional. And not meeting CMMC requirements now can result in disqualification from doing business with the DoD altogether. That should have supply chain companies in manufacturing, technology, logistics, and more reading about CMMC news. Supply Chains On Red Alert for Cybersecurity And big financial institutions, health care providers, and other operators of critical infrastructure are all taking notice. CMMC marks a move to formal, enforceable cybersecurity standards, in contrast to voluntary guidelines. Industry experts also note that CMMC’s configuration, including third-party accreditation and defined levels of maturity, as well as publicly trackable compliance, could serve as a model for future regulatory efforts in various industries. Staying Current on CMMC News: Why It Matters Given that CMMC is rapidly evolving, not being current isn’t an option. Policy changes, interim rules and enforcement updates revise timeframes and alter compliance expectations. Firms that are constantly kept abreast of the CMMC can enjoy several benefits, some of which are mentioned in the rundown: Final Thoughts As cyber threats become increasingly sophisticated, organized certification frameworks such as CMMC are becoming the rule rather than the exception. For contractors, suppliers and service providers, keeping up to date with CMMC news is about more than checking compliance boxes. This is a matter of future-proofing business activity and staying up to date to continue operating in markets that are becoming increasingly security-aware. As the bar for …