Elcomsoft
560 subscribers
533 photos
1 video
1 file
418 links
Elcomsoft official channel is the place where you can find news, events and the latest updates of our products.

website: elcomsoft.com
twitter: twitter.com/elcomsoft
youtube: youtube.com/c/ElcomsoftCompany
blog: blog.elcomsoft.com
t.me/elcomsoftru
Download Telegram
You Lost Your Second Authentication Factor. Now What? What if you do know your password and your passcode but lost access to the only physical iOS device using your Apple ID and your SIM card at the same time? This could easily happen if you travel abroad and your phone is stolen together with the SIM card.

👉 https://blog.elcomsoft.com/2019/04/you-lost-your-second-authentication-factor-now-what/

#iphone #2fa #authentication #apple #iforgot #icloud #password #dataaccess #ios #verification
Elcomsoft Phone Viewer 4.50 adds data export support, allows evidence analysis in external tools

Elcomsoft Phone Viewer is updated to enable the exporting of digital evidence collected from iOS device backups, iCloud and file system images to Microsoft Excel. The ability to export data enables experts to continue the investigation in their forensic product of choice.

👉 https://www.elcomsoft.com/news/720.html

#dfir #iphone #ios #security #decryption #2fa #report #evidence #investigation #dataextraction
ElcomSoft Phone Breaker 9.10 fixes iCloud backups downloading for iOS 11.2-12.4

Elcomsoft Phone Breaker 9.10 introduces experimental support for iCloud backups created with iPhone and iPad devices running iOS 11.2 through 12.4 even if two-factor authentication is enabled. In addition, the tool is now able to access the complete set of iCloud synchronized data, including Health and Messages, from Windows computers.

👉 https://www.elcomsoft.com/news/721.html

#icloud #ios12 #iphone #mobileforensics #backup #jb #2FA #telegram #phonebreaker #freedownload #crypto #imessage
Accessing iCloud With and Without a Password in 2019

In iOS forensics, cloud extraction is a viable alternative when physical acquisition is not possible. The upcoming release of iOS 13 brings additional security measures that will undoubtedly make physical access even more difficult. While the ability to download iCloud backups has been around for years, the need to supply the user’s login and password followed by two-factor authentication was always a roadblock.

It took us more than a year to figure out a workaround allowing experts to transfer authentication tokens from the user’s computer...

👉 https://blog.elcomsoft.com/2019/07/accessing-icloud-with-and-without-a-password-in-2019/

#software #forensics #dfir #encryption #iOS13 #icloud #password #2FA #backup #decryption #messages #token #keychain
Breaking and Securing Apple iCloud Accounts

The cloud becomes an ever more important (sometimes exclusive) source of the evidence whether you perform desktop or cloud forensics. Even if you are not in forensics, cloud access may help you access deleted or otherwise inaccessible data.

Let’s review all the possibilities of accessing Apple iCloud data with or without a password.

👉 https://blog.elcomsoft.com/2019/07/breaking-and-securing-apple-icloud-accounts/

#iCloud #iOS #forensocs #dfir #forensicsoftware #smartphone #encryption #2FA #toolkit #jailbreak #token #security #cloudsecurity #mobileforensics
Elcomsoft Cloud Explorer 2.25 fixes Google Account authentication for some accounts

Elcomsoft Cloud Explorer 2.25 is a maintenance release with minor bug fixes and a major change under the hood. The fix resolves authentication issues on some Google accounts with specific two-factor authentication settings. The brand-new authentication algorithm we have under the hood is significantly more robust than the one it replaces.

👉 https://www.elcomsoft.com/news/731.html

#Cloud #GoogleAccount #2FA #authentication
Apple Two-Factor Authentication: SMS vs. Trusted Devices

Multi-factor authentication is the new reality. A password alone is no longer considered sufficient. Phishing attacks, frequent leaks of password databases and the ubiquitous issue of reusing passwords make password protection unsafe. Adding “something that you have” to “something that you know” improves the security considerably, having the potential of cutting a chain attack early even in worst case scenarios. However, not all types of two-factor authentication are equally secure.

Let’s talk about the most commonly used type of two-factor authentication: the one based on text messages (SMS) delivered to a trusted phone number.

👉 https://blog.elcomsoft.com/2020/06/apple-two-factor-authentication-sms-vs-trusted-devices/

#2fa #itsecurity #cybersecurity #authentication #clouds #mobilesecurity #smartphone
iCloud Backups, Synced Data and End-to-End Encryption

Initially, iCloud backups were similar in content to local (iTunes) backups without the password. However, the introduction of iCloud sync has changed the rules of the game. With more types of data synchronized through iCloud as opposed to being backed up, the content of iCloud backups gets slimmed down as synchronized information is excluded from cloud backups, though still present in local backups.

Two-factor authentication (or lack thereof) affects what can and what cannot be synchronized. Sounds confusing? Let’s shed some light on the types of data that might be available in iCloud backups and how they are affected by the optional data sync.

👉 https://blog.elcomsoft.com/2020/06/icloud-backups-synced-data-and-end-to-end-encryption/

#ios #iphone #sync #backup #icloud #2fa #cloud
iCloud Extraction Streamlined

Apple iCloud contains massive amounts of data, which may become highly valuable evidence. The oldest and most frequently mentioned are iCloud backups, which ElcomSoft were the first to extract back in 2012. A lot has changed since then. Today, iCloud backups account for a very minor part of the evidence available in iCloud. Learn what types of data are stored in iCloud, how Apple protects the data with end-to-end encryption, and how to access that valuable evidence with the updated Elcomsoft Phone Breaker.

👉 https://blog.elcomsoft.com/2020/06/icloud-extraction-streamlined/

#ios #iphone #sync #backup #icloud #2fa #cloud #dataextraction
ElcomSoft Phone Breaker 10 adds device-based iCloud authentication

Elcomsoft Phone Breaker 10 adds the ability to use a trusted iOS device to authenticate iCloud extraction. Every type of data becomes extractable including end-to-end encrypted data, and no password is required.

👉 https://www.elcomsoft.com/news/795.html

#ios #dfir #cloudforensics #2fa #cloudsecurity
iCloud Extractions Without Passwords and Tokens: When a Trusted Device is Enough

A lot of folks (and even some law enforcement experts) are looking for a one-click solution for mobile extractions and data decryption. Unfortunately, in today’s day and age there are no ‘silver bullet’ solutions. In the days of high-tech mobile devices and end-to-end encryption one must clearly understand the available options, and plan their actions accordingly. The time of ‘snake oil’ exploits is long gone. The modern world of mobile forensics is complex, and your actions will depend on a lot of factors. Today, we’re going to make your life a notch more complex by introducing a new iCloud authentication option you’ve never heard of before.

👉 https://blog.elcomsoft.com/2021/10/icloud-extractions-without-passwords-and-tokens-when-a-trusted-device-is-enough/

#ios #icloud #2fa #dfir #cloudsecurity #cloudforensics