14 June, 2018ElcomSoft Phone Breaker 8.30 Extracts iMessages from iCloud
Elcomsoft Phone Breaker 8.30 gains the ability to remotely extract iMessage conversations synced to iCloud by iPhone devices running iOS 11.4 and newer. EPB 8.30 becomes the first forensic tool to extract encrypted iMessage conversation histories from the cloud.
7 June, 2018Elcomsoft Phone Viewer Now Supports TAR Images and Locations
Elcomsoft Phone Viewer receives a major update, adding the ability to process and view TAR files produced in the course of physical acquisition with Elcomsoft iOS Forensic Toolkit. In addition, EPV 3.70 adds support for aggregated location data.
29 May, 2018Elcomsoft Explorer for WhatsApp Adds WhatsApp Business Support
Elcomsoft Explorer for WhatsApp 2.40 adds the ability to extract and decrypt information from WhatsApp Business for Android. Supporting physical acquisition from rooted Android handsets as well as stand-alone backups created by Android users in Google Drive, the tool offers full Android support for the Business app.
17 May, 2018Elcomsoft Cloud Explorer 2.10: Passwordless Authentication and Google Drive Support
Elcomsoft Cloud Explorer 2.10 introduces forensically sound extraction for Google Drive files. In addition, the tool adds the ability to access information stored in the Google Account without a password. The newly available tool extracts Google authentication tokens from the user’s computer, and uses them to authenticate into a Google Account.
5 April, 2018Elcomsoft Wireless Security Auditor Adds Built-In Dictionaries, Improves Wi-Fi Attack Speeds
Wireless Security Auditor 7.12 packs a number of performance and usability improvements, including new built-in dictionaries, various attack improvements and a number of extra settings for wireless sniffing. In addition, the new release makes it easier to reinstall the drivers should the NDIS stack crash. The new release improves the chance of successful attacks, and makes operation smoother and easier.
20 February, 2018Elcomsoft iOS Forensic Toolkit 3.0: Physical Acquisition for iOS 10.x and iOS 11
iOS Forensic Toolkit 3.0 adds full physical acquisition support for previously unsupported versions of iOS 10 as well as iOS 11.0 through 11.1.2. In addition, EIFT 3.0 adds the ability to extract data from certain apps even without jailbreak.
8 February, 2018Elcomsoft Phone Breaker 8.20 Extracts More Synced Data Including Wi-Fi and Apple Maps
Elcomsoft Phone Breaker 8.20 adds the ability to extract additional types of data synced by iOS devices through iCloud. The newly available types of data include user and account data; information about Wi-Fi networks; routes, searches and icons from Apple Maps, as well as Wallet and iBooks data. Elcomsoft Phone Viewer is also updated to display the additional categories.
31 January, 2018Forensic Disk Decryptor 2.0 Provides All in One Solution for Accessing Encrypted Volumes
Elcomsoft Forensic Disk Decryptor receives a major update, gaining the ability to mount or decrypt encrypted containers using their respective passwords, escrow keys, or cryptographic keys extracted from the computer’s volatile memory image. Elcomsoft Forensic Disk Decryptor comes with a built-in memory dumping tool, allowing experts to image computer’s RAM.
25 January, 2018Elcomsoft Wireless Security Auditor: Microsoft Signed NDIS Driver, Attacks Targeting the Human Factor
Wireless Security Auditor 7.11 adds smarter attacks targeting the human factor, allowing recovering most long and complex Wi-Fi passwords unless they are completely random. Wireless sniffing support for generic Wi-Fi adapters is improved with kernel-level NDIS driver receiving a Microsoft approval and digital signature. This encores seamless installation and full compatibility with all versions of Windows 10 including the latest Fall Creators Update.
24 January, 2018Elcomsoft Explorer for WhatsApp Extracts Android WhatsApp Backups from Google Drive
Elcomsoft Explorer for WhatsApp 2.30 adds the ability to extract and decrypt WhatsApp stand-alone backups created by Android users in Google Drive. The tool obtains a WhatsApp cryptographic key by registering itself as a new device. Access to user’s Google authentication credentials and their verified phone number is required to generate the encryption key.