Quantcast
Channel: Security – ElcomSoft blog
Browsing all 12 articles
Browse latest View live

Challenges in Computer and Mobile Forensics: What to Expect in 2020

Challenges in Computer and Mobile Forensics: What to Expect in 2020 The past two years introduced a number of challenges forensic experts have never faced before. In 2018, Apple made it more difficult...

View Article



Image may be NSFW.
Clik here to view.

Attached Storage Forensics: Security Analysis of Thecus NAS

Thecus has been manufacturing NAS devices for more than 15 years. The company develops an in-house Linux-based NAS OS, the ThecusOS. At this time, the most current version of the OS is ThecusOS 7....

View Article

Image may be NSFW.
Clik here to view.

Attached Storage Forensics: Security Analysis of TerraMaster NAS

TerraMaster is a relatively new company specializing in network attached storage and direct attached storage solutions. The majority of TerraMaster NAS solutions are ARM64 and Intel-based boxes aimed...

View Article

Image may be NSFW.
Clik here to view.

The True Meaning of iOS Recovery, DFU and SOS Modes for Mobile Forensics

What is DFU, and how is it different from the recovery mode? How do you switch the device to recovery, DFU or SOS mode, what can you do while in these modes and what do they mean in the context of...

View Article

Image may be NSFW.
Clik here to view.

Introduction to BitLocker: Protecting Your System Disk

If you are a Windows user and ever considered protecting your data with full-disk encryption, you have probably heard about BitLocker. BitLocker is Microsoft’s implementation of full-disk encryption...

View Article


Image may be NSFW.
Clik here to view.

A Comprehensive Guide on Securing Your System, Archives and Documents

How can you make your system and documents secure? Today, 256-bit AES encryption is offered by everyone and their dog. However, AES encryption does not mean much (or anything at all) when it comes to...

View Article

Image may be NSFW.
Clik here to view.

Researching Confide Messenger Encryption

iPhone users have access to literally hundreds of instant messaging apps. These apps range all the way from the built-in iMessage app to the highly secure Signal messengers, with all stops in between....

View Article

Image may be NSFW.
Clik here to view.

Demystifying iOS Data Security

It’s an honor to be given the opportunity to post on the ElcomSoft Blog, and I’d like to thank the ElcomSoft team for supporting my research. Recently I’ve been sent over a few questions from members...

View Article


Image may be NSFW.
Clik here to view.

Speed > Security – Apple’s Approach To iOS Data Security

Today I’m going to be discussing my understanding of a few security concepts Apple have implemented in iOS – including how these concepts influence the user experience and the inevitable outcome for...

View Article


Image may be NSFW.
Clik here to view.

Secure Instant Messengers

In today’s world of everyone wanting a slice of one’s personal information, users become more and more concerned about the privacy. The WhatsApp/Facebook integration raised an additional concern,...

View Article

What is Password Recovery and How It Is Different from Password Cracking

Why wasting time recovering passwords instead of just breaking in? Why can we crack some passwords but still have to recover the others? Not all types of protection are equal. There are multiple types...

View Article

Image may be NSFW.
Clik here to view.

Forensic Acquisition of Apple TV with checkra1n Jailbreak

Are you excited about the new checkm8 exploit? If you haven’t heard of this major development in the world of iOS jailbreaks, I would recommend to read the Technical analysis of the checkm8 exploit...

View Article
Browsing all 12 articles
Browse latest View live




Latest Images