News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

iOS Extraction Toolkit 8 to extract iPhone and iPad
iOS Extraction Toolkit 8 to extract iPhone and iPad

ElcomSoft comes out with a major update of the mobile forensic extraction tool Elcomsoft iOS Forensic Toolkit to extract selected iPhone and iPad models. checkm8-based extraction process enables the most complete extraction, extracting all keychain records regardless of protection class and the entire file system content. The new version 8.0 offers repeatable, verifiable and forensically sound checkm8 extraction for a wide range of Apple devices and features an updated command line driven user interface. Additionally, full passcode unlocking is now available for select older Apple devices. A Mac edition of the tool is currently available, Linux and Windows editions will be available in…

Read more

Forensic tool cracks Windows Hello PIN codes
Forensic tool cracks Windows Hello PIN codes

ElcomSoft cracks Windows Hello PIN codes with its forensics tool and attacks the LUKS2 encryption. This extends the range of forensic password recovery tools to include support for Windows Hello PIN codes on TPM-less computers. There is also support for the new LUKS2 specification for encrypted disks and containers in Linux. Microsoft implements PIN codes as part of Windows Hello authentication and recommends using PIN codes instead of a password. By default, PIN codes contain only digits, but alphanumeric PINs are also possible. While 4- to 6-digit PINs can be cracked in minutes, attacking an alphanumeric PIN…

Read more

Swiss Army Knife for Desktop Forensics
B2B Cyber ​​Security ShortNews

ElcomSoft has updated Elcomsoft System Recovery for Desktop Forensics, a bootable tool for unlocking Windows accounts, accessing encrypted volumes, and unlocking encrypted virtual machines. The new features that help investigators find encrypted virtual machines and map hard drives by booting from a USB drive make Elcomsoft System Recovery a Swiss Army Knife for digital desktop forensics. Virtual Machines as a Obfuscation Tool In the world of high-tech crime, encrypted virtual machines are an often used obfuscation tool. Manually identifying such virtual machines can be a laborious manual process. Elcomsoft System Recovery ...

Read more

Forensics: Keys for virtual machines

Elcomsoft opens encrypted virtual machines for law enforcement forensic experts. The new version 4.30 of the Elcomsoft Distributed Password Recovery product supports access to additional encrypted virtual machines. As a result, forensic researchers now have access to data stored in encrypted VMware, Parallels and VirtualBox virtual machines. Additionally, a new rules editor has been added to the UI, allowing users to edit hybrid attack rules directly in the UI. "Virtual machines are very common in the criminal world," explains Andy Malyshev, CEO of ElcomSoft. “By using an encrypted virtual machine, criminals can…

Read more