Vídeo

Comunicado De Prensa

Documentos

"Secure Password Managers" and "Military-Grade Encryption" on Smartphones: Oh, Really?.

Paper we will analyze applications designed to facilitate storing and management of passwords on mobile platforms, such as Apple iOS and BlackBerry. We will specifically focus our attention on the security of data at rest. We will show that many password keeper apps fail to provide claimed level of protection.

Open Sesame!.

The easy way to restore access passwords to files, applications and databases.

An effective approach to restoring system access in Windows.

The easy way to restore access passwords to files, applications and databases.

Proactive is better than reactive.

Testing password safety – a key to securing a corporate network.

Advantages and disadvantages of EFS and effective recovery of encrypted data

The easy way to restore access passwords to files, applications and databases.

Unlocking PDF

The easy way to restore access passwords to files, applications and databases.

Size does matter

Advantages of distributed password recovery.

ElcomSoft Solutions

in the corporate information security environment.

Libros sobre nosotros

Overall security & encryption topics and tutorials
Windows login passwords, AEFSDR
Elcomsoft Distributed Password Recovery
Advanced EFS Data Recovery, Elcomsoft Distributed Password Recovery, PGP
MS Office password
Elcomsoft Distributed Password Recovery, GPU
Advanced EFS Data Recovery

Artículos sobre nosotros

In some cases, investigators obtained photos, text messages, call records, browsing data, cookies, and location data from seized iPhones. Some executed search warrants explicitly mention the type of extraction performed, such as so-called "Logical" or "Advanced Logical" extraction. The latter is a term with a meaning that varies between different phone data extraction companies, but generally it relates to creating a device backup as iTunes does normally and obtaining some more data on top of that, Vladimir Katalov, the CEO of iOS forensics firm Elcomsoft, told Motherboard. Katalov said those backups can contain the sorts of pieces of data that investigators obtained, and is available to all models of iPhone.

We Built a Database of Over 500 iPhones Cops Have Tried to Unlock

11 March, 2020Vice

“Looks like [the] experts were not qualified enough,” Vladimir Katalov, CEO of iOS forensics firm Elcomsoft, told Motherboard.

Here Is the Technical Report Suggesting Saudi Arabia’s Prince Hacked Jeff Bezos’ Phone

22 January, 2020Vice

Vladimir Katalov, CEO of Russian forensic tech provider ElcomSoft, called Barr's request unrealistic because Apple can’t “technically” unlock iPhones because of file-based encryption and secure enclave technology; it boots up separately from iOS and runs its own microkernel not directly accessible by the iPhone operating system.

Feds may already have found a way to hack into Apple iPhones

21 January, 2020Computerworld

Presentaciones

Data acquisition from iOS devices. New approaches and possibilities.

5 March, 2020

Extracting evidence from a seized iPhone: Using the latest exploits and innovative methods. Collecting data from latest iOS devices without jailbreaking them is possible. The new approach uses an extraction agent that installs onto iOS device. Compared with the traditional mobile forensic method using jailbreak, the use of agent allows us to perform the full file system extraction and decrypt the keychain without the risks and footprint associated with third-party jailbreaks. Details in the presentation.

PDF
Breaking Health Clouds

1 December, 2019

The amount of data collected by health trackers is amazing: from step count and heart rate to running and walking distances with exact timestamps and lots of geolocation data. Some of it goes directly to Apple Health and then to Apple iCloud, while other manufacturers (Samsung or FitBit) keep data in their own clouds. Something goes to Google Fit. Apart from privacy issues, think of how much data can serve as essential evidence during investigations.

PDF
The iPhone's Forensic Workflow: The Steps to Access Critical Evidence

6 November, 2019

Latest version of Apple’s mobile operating system actively resist forensic efforts by disabling the less secure biometric identification (Touch ID or Face ID) and blocking USB connectivity after a short period of time. Many of these restrictions can be effectively bypassed with proper timing and the right technique.

PDF
Health and Activity Evidence

29 January, 2020

Fitbit and other health trackers: obtaining important evidence you probably did not think about. Find out how smartphones and trackers collect and store health data, and how to obtain health information.

PDF
Software and Technologies: Password Cracking and Encrypted Data Access, Mobile Forensics, Cloud Forensics

13 November, 2019

Our digital forensic solutions enable experts to gain access to password-protected, locked and encrypted information contained in a range of mobile devices and cloud services, stored in crypto containers or encrypted archives. The company’s parented hardware-accelerated products can break passwords protecting files in a variety of formats, including encryption used in BitLocker, FileVault 2, PGP Disk and TrueCrypt successors' containers.

PDF
Accessing Apple and Google cloud accounts to get real-time evidence: from passwords to conversations, from locations to documents.

13 June, 2019

Smartphones become more secure with every new model and software update. At the same time, users learn more about security and protect their devices at the highest possible level, so even traditional logical acquisition is often not possible. Cloud acquisition comes to the rescue – in many cases you can get even more than from the device itself.

PDF

Estudios de caso

Nuestros logotipos, pancartas y otros gráficos