Challenges in Computer and Mobile Forensics: What to Expect in 2020
Challenges in Computer and Mobile Forensics: What to Expect in 2020 The past two years introduced a number of challenges forensic experts have never faced before. In 2018, Apple made it more difficult...
View ArticleAttached Storage Forensics: Security Analysis of Thecus NAS
Thecus has been manufacturing NAS devices for more than 15 years. The company develops an in-house Linux-based NAS OS, the ThecusOS. At this time, the most current version of the OS is ThecusOS 7....
View ArticleAttached Storage Forensics: Security Analysis of TerraMaster NAS
TerraMaster is a relatively new company specializing in network attached storage and direct attached storage solutions. The majority of TerraMaster NAS solutions are ARM64 and Intel-based boxes aimed...
View ArticleThe True Meaning of iOS Recovery, DFU and SOS Modes for Mobile Forensics
What is DFU, and how is it different from the recovery mode? How do you switch the device to recovery, DFU or SOS mode, what can you do while in these modes and what do they mean in the context of...
View ArticleIntroduction to BitLocker: Protecting Your System Disk
If you are a Windows user and ever considered protecting your data with full-disk encryption, you have probably heard about BitLocker. BitLocker is Microsoft’s implementation of full-disk encryption...
View ArticleA Comprehensive Guide on Securing Your System, Archives and Documents
How can you make your system and documents secure? Today, 256-bit AES encryption is offered by everyone and their dog. However, AES encryption does not mean much (or anything at all) when it comes to...
View ArticleResearching Confide Messenger Encryption
iPhone users have access to literally hundreds of instant messaging apps. These apps range all the way from the built-in iMessage app to the highly secure Signal messengers, with all stops in between....
View ArticleDemystifying iOS Data Security
It’s an honor to be given the opportunity to post on the ElcomSoft Blog, and I’d like to thank the ElcomSoft team for supporting my research. Recently I’ve been sent over a few questions from members...
View ArticleSpeed > Security – Apple’s Approach To iOS Data Security
Today I’m going to be discussing my understanding of a few security concepts Apple have implemented in iOS – including how these concepts influence the user experience and the inevitable outcome for...
View ArticleSecure Instant Messengers
In today’s world of everyone wanting a slice of one’s personal information, users become more and more concerned about the privacy. The WhatsApp/Facebook integration raised an additional concern,...
View ArticleWhat is Password Recovery and How It Is Different from Password Cracking
Why wasting time recovering passwords instead of just breaking in? Why can we crack some passwords but still have to recover the others? Not all types of protection are equal. There are multiple types...
View ArticleForensic Acquisition of Apple TV with checkra1n Jailbreak
Are you excited about the new checkm8 exploit? If you haven’t heard of this major development in the world of iOS jailbreaks, I would recommend to read the Technical analysis of the checkm8 exploit...
View Article
More Pages to Explore .....