UPEK Fingerprint Readers: a Huge Security Hole
Most laptops today ship with a fingerprint reader. Most likely, you have a laptop with one. Until very recently, most major manufacturers such as Acer, ASUS, Dell, Gateway, Lenovo, MSI, NEC, Samsung,...
View ArticleElcomSoft Breaks Into MS Office 2013
ElcomSoft has recently updated two products recovering Microsoft Office passwords with Office 2013 support. Elcomsoft Advanced Office Password Recovery and Elcomsoft Distributed Password Recovery...
View ArticleElcomsoft, UPEK and more
[That was one *awesome* passphrase! :-)] Elcomsoft has announced that certain versions of fingerprint software named Protector Suite made by UPEK (now part of Authentec) stores your Windows password...
View ArticleElcomSoft Decrypts BitLocker, PGP and TrueCrypt Containers
BitLocker, PGP and TrueCrypt set industry standard in the area of whole-disk and partition encryption. All three tools provide strong, reliable protection, and offer a perfect implementation of strong...
View ArticleDéjà vu
The story about PGP becomes really funny. Three and a half years ago (in April 2009) our company took part in InfoSecurity Europe in London. I should confess that London is one of my favourite cities;...
View ArticleKeeper Password Manager & Digital Vault: security review
Introduction Two years ago, ElcomSoft analyzed some 17 password management applications for mobile platforms only to discover that no single app was able to deliver the claimed level of protection. The...
View ArticleElcomSoft Open Letter on Latest Developments in iCloud Security
In light of recent security outbreaks, Apple introduced a number of changes to its security policies. As one of the leading security companies and a major supplier of forensic software for iOS devices,...
View ArticleSupporting Apple iCloud Drive and Decrypting Keychains from iCloud
As you may already know from our official announcement, we’ve recently updated Elcomsoft Phone Breaker to support Apple accounts upgraded to iCloud Drive and decrypting keychains from iCloud....
View ArticleElcomsoft Forensic Disk Decryptor Video Tutorial
Quite often our new customers ask us for advice about what they should start with in order to use the program effectively. In fact, there are various situations when the tool can come in handy by...
View ArticleVideo Tutorial on Decryption of Windows EFS-encrypted Data
Although we’ve already embraced the EFS-encryption/decryption in some of our white papers and case studies, now we’d like to share a video tutorial because seeing once is better than hearing reading...
View ArticleHacking For Dummies by Kevin Beaver (5th edition)
It is our greatest pleasure to recommend the newest edition of “Hacking For Dummies” by Kevin Beaver, an independent IT security consultant, a practical guide on computer and mobile security updated to...
View ArticleA Message to Our Customers, Apple and FBI
On Tuesday, a federal judge ordered Apple to assist the authorities in breaking into a locked iPhone 5C used by Syed Farook, who killed 14 in San Bernardino in December. According to the FBI, the phone...
View ArticleMac OS Forensics: Attacking FileVault 2
In the world of Windows dominance, Apple’s Mac OS X enjoys a healthy market share of 9.5% among desktop operating systems. The adoption of Apple’s desktop OS (macOS seems to be the new name) is...
View ArticleExtracting WhatsApp Conversations from Android Smartphones
Share List As you may already know, we’ve added Android support to our WhatsApp acquisition tool, Elcomsoft Explorer for WhatsApp. While the updated tool can now extract WhatsApp communication...
View ArticleHow to Break 30 Per Cent of Passwords in Seconds
Share List This article opens a new series dedicated to breaking passwords. It’s no secret that simply getting a good password recovery tool is not enough to successfully break a given password....
View ArticleOne Password to Rule Them All: Breaking into 1Password, KeePass, LastPass and...
Share List We’ve just updated Elcomsoft Distributed Password Recovery with the ability to break master passwords protecting encrypted vaults of the four popular password keepers: 1Password, KeePass,...
View ArticleApple Health Is the Next Big Thing: Health, Cloud and Security
Health data is among the most important bits of information about a person. Health information is just as sensitive as the person’s passwords – and might be even more sensitive. It is only natural that...
View ArticleA Bootable Flash Drive to Extract Encrypted Volume Keys, Break Full-Disk...
Full-disk encryption presents an immediate challenge to forensic experts. When acquiring computers with encrypted system volumes, the investigation cannot go forward without breaking the encryption...
View ArticleMicrosoft Office encryption evolution: from Office 97 to Office 2019
The first Microsoft Office product was announced back in 1988. During the past thirty years, Microsoft Office has evolved from a simple text editor to a powerful combination of desktop apps and cloud...
View ArticleSynology NAS Encryption: Forensic Analysis of Synology NAS Devices
Home users and small offices are served by two major manufacturers of network attached storage devices (NAS): QNAP and Synology, with Western Digital being a distant third. All Qnap and Synology...
View Article
More Pages to Explore .....