30 April, 2020 | Help Net Security - https://www.helpnetsecurity.com/Elcomsoft Phone Viewer 5.0 gains the ability to display conversation histories and secret chats in Telegram
ElcomSoft updates Elcomsoft Phone Viewer, the company’s forensic extraction tool. Version 5.0 gains the ability to display conversation histories and secret chats in Telegram, one of the world’s most popular instant messaging apps.
11 March, 2020 | Vice - https://www.vice.com/We Built a Database of Over 500 iPhones Cops Have Tried to Unlock
In some cases, investigators obtained photos, text messages, call records, browsing data, cookies, and location data from seized iPhones. Some executed search warrants explicitly mention the type of extraction performed, such as so-called "Logical" or "Advanced Logical" extraction. The latter is a term with a meaning that varies between different phone data extraction companies, but generally it relates to creating a device backup as iTunes does normally and obtaining some more data on top of that, Vladimir Katalov, the CEO of iOS forensics firm Elcomsoft, told Motherboard. Katalov said those backups can contain the sorts of pieces of data that investigators obtained, and is available to all models of iPhone.
22 January, 2020 | Vice - https://www.vice.com/Here Is the Technical Report Suggesting Saudi Arabia’s Prince Hacked Jeff Bezos’ Phone
“Looks like [the] experts were not qualified enough,” Vladimir Katalov, CEO of iOS forensics firm Elcomsoft, told Motherboard.
21 January, 2020 | Computerworld - https://www.computerworld.com/Feds may already have found a way to hack into Apple iPhones
Vladimir Katalov, CEO of Russian forensic tech provider ElcomSoft, called Barr's request unrealistic because Apple can’t “technically” unlock iPhones because of file-based encryption and secure enclave technology; it boots up separately from iOS and runs its own microkernel not directly accessible by the iPhone operating system.
21 January, 2020 | AppleInsider - https://appleinsider.com/What Apple surrenders to law enforcement when issued a subpoena
Or that's what Apple says, at least. According to data forensics company ElcomSoft, iCloud backups are "inherently much less secure" than users would hope. "If you have iCloud backups enabled, the encryption key for iMessages will be stored in the backup," the company says in a blog.
23 December, 2019 | Mashable - https://mashable.com/Company Says It Can Extract Email Addresses, Passwords From Locked iPhones
Elcomsoft, which creates digital forensic software for governments and law enforcement agencies, said on Friday that its iOS Forensic Toolkit can now extract some data from locked iPhones and iPads in Before First Unlock (BFU) mode.
21 December, 2019 | Hothardware - https://hothardware.com/Locked iPhones On iOS 13.3 Uncrackable? Guess Again, Elcomsoft’s Tool Gets At Data
A company that develops digital forensics tools for businesses and law enforcement specialists has found a way to hack into locked Apple iPhone devices running the latest version of iOS. The method is said to work on most iPhone models, from the iPhone 5s through the iPhone X, and is effective on iOS 12 through iOS 13.3.
21 December, 2019 | Forbes - https://www.forbes.com/New Apple iOS 13.3 Security Threat: User Passwords ‘Extracted From Locked Devices’
Russian cybersecurity firm Elcomsoft, which provides forensic data extraction tools for security and law enforcement agencies is making headlines today (December 21) with a claim that one of its updated tools can now “extract select keychain records” from iPhones in their most secure state.
20 December, 2019 | GottaBeMobile.com - https://www.gottabemobile.com/5 Things to Know About the iOS 13.3.1 Update
Security company Elcomsoft has also discovered an exploit present in iOS 12-iOS 13.3 that allows people to extract email user names and passwords from locked iPhones. Don’t be surprised if iOS 13.3.1 patches this issue up.
20 December, 2019 | AppleInsider - https://appleinsider.com/Elcomsoft tool can seize partial keychain from locked iPhones on iOS 13.3
Forensic software developer Elcomsoft has updated its toolset for iOS to enable the extraction of Keychain elements from iPhones running iOS 12 to iOS 13.3, with the ability to acquire partial Keychain data from disabled and locked iPhones that have yet to be unlocked after being turned on.