Artiklar Om Oss

22 January, 2020 | Vice - https://www.vice.com/

Here Is the Technical Report Suggesting Saudi Arabia’s Prince Hacked Jeff Bezos’ Phone

“Looks like [the] experts were not qualified enough,” Vladimir Katalov, CEO of iOS forensics firm Elcomsoft, told Motherboard.

21 January, 2020 | Computerworld - https://www.computerworld.com/

Feds may already have found a way to hack into Apple iPhones

Vladimir Katalov, CEO of Russian forensic tech provider ElcomSoft, called Barr's request unrealistic because Apple can’t “technically” unlock iPhones because of file-based encryption and secure enclave technology; it boots up separately from iOS and runs its own microkernel not directly accessible by the iPhone operating system.

21 January, 2020 | AppleInsider - https://appleinsider.com/

What Apple surrenders to law enforcement when issued a subpoena

Or that's what Apple says, at least. According to data forensics company ElcomSoft, iCloud backups are "inherently much less secure" than users would hope. "If you have iCloud backups enabled, the encryption key for iMessages will be stored in the backup," the company says in a blog.

23 December, 2019 | Mashable - https://mashable.com/

Company Says It Can Extract Email Addresses, Passwords From Locked iPhones

Elcomsoft, which creates digital forensic software for governments and law enforcement agencies, said on Friday that its iOS Forensic Toolkit can now extract some data from locked iPhones and iPads in Before First Unlock (BFU) mode.

21 December, 2019 | Hothardware - https://hothardware.com/

Locked iPhones On iOS 13.3 Uncrackable? Guess Again, Elcomsoft’s Tool Gets At Data

A company that develops digital forensics tools for businesses and law enforcement specialists has found a way to hack into locked Apple iPhone devices running the latest version of iOS. The method is said to work on most iPhone models, from the iPhone 5s through the iPhone X, and is effective on iOS 12 through iOS 13.3.

21 December, 2019 | Forbes - https://www.forbes.com/

New Apple iOS 13.3 Security Threat: User Passwords ‘Extracted From Locked Devices’

Russian cybersecurity firm Elcomsoft, which provides forensic data extraction tools for security and law enforcement agencies is making headlines today (December 21) with a claim that one of its updated tools can now “extract select keychain records” from iPhones in their most secure state.

20 December, 2019 | GottaBeMobile.com - https://www.gottabemobile.com/

5 Things to Know About the iOS 13.3.1 Update

Security company Elcomsoft has also discovered an exploit present in iOS 12-iOS 13.3 that allows people to extract email user names and passwords from locked iPhones. Don’t be surprised if iOS 13.3.1 patches this issue up.

20 December, 2019 | AppleInsider - https://appleinsider.com/

Elcomsoft tool can seize partial keychain from locked iPhones on iOS 13.3

Forensic software developer Elcomsoft has updated its toolset for iOS to enable the extraction of Keychain elements from iPhones running iOS 12 to iOS 13.3, with the ability to acquire partial Keychain data from disabled and locked iPhones that have yet to be unlocked after being turned on.

20 December, 2019 | Mashviral - https://mashviral.com/locked-iphones-still-offer-access-to-email-references-and-more/

Locked iPhones still offer access to email references and more

Elcomsoft, a company that sells tools to law enforcement agencies to access locked iPhones, says it is now able to extract some data from devices with any version of iOS from 12.0 to 13.3. [...] The company has discovered that certain parts of data were already available on iOS devices before the first unlocking. Elcomsoft discovered that some keychain data is accessible even at this stage.

20 December, 2019 | 9to5mac.com/ - https://9to5mac.com/

Email usernames and passwords can be extracted from locked iPhones on iOS 13.3

Elcomsoft, a company which sells tools to law enforcement agencies to access locked iPhones, says that it is now able to extract some data from devices running any version of iOS from 12.0 to 13.3.