La Presse Parle De Nous

11 March, 2020 | Vice -

We Built a Database of Over 500 iPhones Cops Have Tried to Unlock

In some cases, investigators obtained photos, text messages, call records, browsing data, cookies, and location data from seized iPhones. Some executed search warrants explicitly mention the type of extraction performed, such as so-called "Logical" or "Advanced Logical" extraction. The latter is a term with a meaning that varies between different phone data extraction companies, but generally it relates to creating a device backup as iTunes does normally and obtaining some more data on top of that, Vladimir Katalov, the CEO of iOS forensics firm Elcomsoft, told Motherboard. Katalov said those backups can contain the sorts of pieces of data that investigators obtained, and is available to all models of iPhone.

24 January, 2020 | Xakep.Ru -

Смартфон Джеффа Безоса был взломан после WhatsApp-сообщения от принца Саудовской Аравии

Глава Elcomsoft Владимир Каталов, сообщил журналистами Vice Motherboard, что изучавшие атаку эксперты, похоже, «не были достаточно квалифицированными»

22 January, 2020 | Vice -

Here Is the Technical Report Suggesting Saudi Arabia’s Prince Hacked Jeff Bezos’ Phone

“Looks like [the] experts were not qualified enough,” Vladimir Katalov, CEO of iOS forensics firm Elcomsoft, told Motherboard.

21 January, 2020 | Computerworld -

Feds may already have found a way to hack into Apple iPhones

Vladimir Katalov, CEO of Russian forensic tech provider ElcomSoft, called Barr's request unrealistic because Apple can’t “technically” unlock iPhones because of file-based encryption and secure enclave technology; it boots up separately from iOS and runs its own microkernel not directly accessible by the iPhone operating system.

21 January, 2020 | AppleInsider -

What Apple surrenders to law enforcement when issued a subpoena

Or that's what Apple says, at least. According to data forensics company ElcomSoft, iCloud backups are "inherently much less secure" than users would hope. "If you have iCloud backups enabled, the encryption key for iMessages will be stored in the backup," the company says in a blog.

13 January, 2020 | Lanline -

ElcomSoft extrahiert iOS-Schlüsselbund von ausgewählten Apple-Geräten

Die Datenextraktion sei jedoch auch auf deaktivierten und gesperrten iPhones möglich, die sich im BFU-Zustand (Before First Unlock) befinden, selbst wenn das Passwort für die Bildschirmsperre nicht vorliegt. Bei EIFT handelt es sich laut Hersteller um ein forensisches Tool, das Strafverfolgungsbehörden und Forensikern dabei hilft, Daten aus einer Reihe von mobilen Apple-Geräten auszulesen.

7 January, 2020 | -

Mit Checkra1n Passwörter aus dem gesperrten iPhone auslesen

Eigentlich sind die Nutzerdaten unter iOS verschlüsselt, auch mit einem Jailbreak sollten sie nicht gelesen werden können. Der Forensiksoftware-Hersteller Elcomsoft will mit der Jailbreak-Software Checkra1n dennoch an Teile des iOS-Schlüsselbundes gelangen können.

23 December, 2019 | Mashable -

Company Says It Can Extract Email Addresses, Passwords From Locked iPhones

Elcomsoft, which creates digital forensic software for governments and law enforcement agencies, said on Friday that its iOS Forensic Toolkit can now extract some data from locked iPhones and iPads in Before First Unlock (BFU) mode.

21 December, 2019 | РЫБИНСКonLine -

В Сети появилась официальная программа для взлома паролей на iPhone

Новое приложение принадлежит авторству программистов компании Elcomsoft. Утилита iOS Forensic Toolkit способна извлекать информацию из заблокированного «яблочного» смартфона. Работает она на iPhone любых версий операционной системы, начиная с седьмой.

21 December, 2019 | Hothardware -

Locked iPhones On iOS 13.3 Uncrackable? Guess Again, Elcomsoft’s Tool Gets At Data

A company that develops digital forensics tools for businesses and law enforcement specialists has found a way to hack into locked Apple iPhone devices running the latest version of iOS. The method is said to work on most iPhone models, from the iPhone 5s through the iPhone X, and is effective on iOS 12 through iOS 13.3.