Skip to main content

Western Digital and Seagate weaken warranty periods

open HDD image
Image used with permission by copyright holder

Announced over the past week, both Western Digital and Seagate plan to decrease the length of warranty periods on consumer-grade hard drives in order to reduce costs and push more money back into product development. Beginning January 2, 2012, the three year warranty on Western Digital Caviar Blue, Caviar Green and Scorpio Blue hard drives will be reduced to 2 years. This will only affect purchases of these drives made after January 1 2012 as the existing warranty will be honored on drives purchased previous to 2012. However, the five year warranty on Western Digital Caviar Black and Scorpio Black drives will not be reduced during 2012. Western Digital does plan to offer an extended warranty for their lineup of hard drives, but will pass that extra cost along to the consumer.

The warranty reductions at Seagate are much more severe. As of December 31, 2011, the five year warranty on Constellation 2, ES.2, Momentus XT and Barracuda XT drives will be reduced to three years. In addition, the five year warranty on Barracuda, Barracuda Green and Momentus 2.5-inch hard drives will be reduced down to one year. Seagate believes that the warranty reduction brings the company line more equal to competitors. However, both of these moves indicate that decreased competition within the hard drive market reduces the need to offer a more competitive hard drive warranty. With Western Digital’s acquisition of Hitachi Global Storage and Seagate’s acquisition of Samsung’s hard drive segment, the two companies will control approximately 90 percent of the hard drive market. 

Recommended Videos

The recent devastating floods in Thailand have been a drain on many technology companies, but Western Digital recently reopened a flooded facility in Bang Pa-in, Thailand that creates hard drive sliders. The company has been working to drain all flood water from the facilities within the country as well as restore all contaminated equipment.

Topics
Mike Flacy
By day, I'm the content and social media manager for High-Def Digest, Steve's Digicams and The CheckOut on Ben's Bargains…
This gorgeous Mac mini hub exacerbates the power button placement problem
M4 Mac mini with Satechi hub on a desk.

Satechi, known for its high-quality tech accessories, is updating its Mac mini hub for the new M4 model. Like previous hubs, it allows Mac mini owners to expand their storage and ports while preserving airflow, wireless signal, and performance. It looks awesome, but this time, the design highlights the problematic nature of the new Mac mini's placement of its power button.

With previous Mac mini models, the power button was at the back, making it easily accessible even when it was in a Satechi hub. The new button placement on the bottom of the PC, however, may prove even more annoying for anyone who wants to buy this accessory.

Read more
Proton VPN vs. Mullvad: Which is the best open-source VPN?
Proton VPN Plus and Mullvad websites appear in a split-screen on a PC monitor.

Open-source software is exploding in popularity and even virtual private networks (VPNs) share code for transparency. With over 100 million open-source developers contributing to the community, there’s an improved chance to find bugs and patch vulnerabilities.

Proton VPN and Mullvad are among the best VPNs available, and both are open-source solutions. You can browse the code used in Proton VPN and Mullvad on GitHub to check that there isn’t any secret logging or undisclosed data collection.

Read more
Some older D-Link routers are vulnerable to attack
D-Link Omna 180 Cam HD

A few legacy D-Link routers can be vulnerable to Remote Code Execution (RCE) attacks since the company refuses to send any updates to patch them up, claiming they have reached end-of-life, as recently posted on its announcement page.

The vulnerability is a serious issue since it allows hackers to take control from anywhere in the world and use a stack buffer overflow. This attack sends more data than the buffer size can handle, potentially corrupting critical information like the return address. Thus, hackers can take control of your PC. However, the company did not detail how the threat works, possibly not informing the hackers too much about the issue.

Read more