22 February, 2016 | IEEE Spectrum - http://spectrum.ieee.org/

Apple Has Already Won. Now It Should Crack the San Bernadino iPhone

Since early 2000, it has been third-party forensic experts and companies—not device manufacturers—who have provided the tools and techniques that law enforcement agencies use to access data stored in mobile devices. Among them are companies such as Access Data, Cellebrite, Compelson, *ElcomSoft*, Final Data, Katana, Logicube, MicroSystemation, Oxygen, Paraben, Radio Tactics, and Susteen. The tools developed by these companies are tested by the National Institute of Justice and approved to provide accurate evidence, admissible in court.

22 December, 2015 | CloudWedge - http://www.cloudwedge.com/

Elcomsoft Cloud eXplorer Provides Forensic Access to Google Account Data

The IT forensics industry is relied upon to categorize the contents of hard drives for legal proceedings. With popular companies such as Google collecting data on their account holders, having access to all of the data a person has stored within their Google account could potentially help investigators solve a case, come to a settlement or settle some sort of disagreement.

27 October, 2015 | CDA News - https://cdanews.com/

The Truth About Hack Vulnerability, It Can Happen to Any Mobile of Internet User

When it comes to hack vulnerability, CEO Vladimir Katalov of Elcomsoft Ltd said, “Basically, you can forget about privacy if you’re using a smartphone or any device.” Elcomsoft is a firm that creates digital forensics software tools for clients like U.S. intelligence agencies, reported CBC News.

26 October, 2015 | CBC News - http://www.cbc.ca/

Apple vs. Google: If you get hacked, which account could be bigger trouble?

If you were to get hacked, would it be worse for the hack to affect your Apple account or your Google account? That depends on a lot of factors. But Vladimir Katalov, CEO of Elcomsoft Ltd., a company that makes digital forensics software tools for customers like U.S. intelligence agencies, says he thinks ultimately, getting your Google account hacked is riskier.

18 March, 2015 | www.spgedwards.com - http://www.spgedwards.com/

Three ways to recover from a forgotten Windows password

You've forgotten your Windows password. What now? I’ll show you three different ways to get back into your system: 1. The ‘right’ way 2. A free but dirty hack 3. An elegant but $50 hack.

21 January, 2015 | Infosecurity Magazine - http://www.infosecurity-magazine.com/

Tackling A False Sense of Device Security

Changing and verifying passwords from a mobile device also puts unsecured data at risk. Until recently, with the two-step iCloud verification, hackers and cyber-criminals could log into your account with stolen or guessed passwords. This access allowed attackers to download a complete back-up of a consumer’s data by using Elcomsoft's Phone Password Breaker.

16 January, 2015 | WallStreet.org - https://www.wallstreet.org/

Apple Inc. (NASDAQ:AAPL) iCloud Is Not Safe

Internet security has been a hot topic since 2014. Be it be Sony or Apple Inc. (NASDAQ:AAPL), the risk of losing data and consciousness about privacy, everyone cares deeply about keeping their lives private. All old methods of verifications are now replaced with biometric verification.

15 January, 2015 | Bidness - http://www.bidnessetc.com/

Apple Inc. iCloud Security Features Still Not Foolproof

The bone of contention with Apple’s security features is that it allows hackers and software such as Phone Breaker an in, because the two-step verification process isn’t spread out across all of Apple’s services. The argument against that, is that most users would not want to be inconvenienced by the added security features.

18 December, 2014 | PC Tech - http://pctechmag.com/

Hackers can still access your iCloud, even with two-step enabled!

If you expect two-step verification to be the ultimate protection against your iCloud, then think again. An update to Elcomsoft’s Phone Breaker software now makes it easier for guys to bypass Apple’s vaunted new two-factor authentication to steal your iCloud stuff.

18 December, 2014 | Engadget - http://www.engadget.com/

Hacking your iCloud files just got easier, even with two-step enabled

An update to Elcomsoft's Phone Breaker software now makes it easier for good or bad guys to bypass Apple's vaunted new two-factor authentication to steal your iCloud stuff. As before, the hackers would need some information to start with -- either your Apple ID/password plus a two-factor code, or a digital token stolen from, say, your laptop.