4 December, 2019 | PiunikaWeb - https://piunikaweb.com/checkra1n opens up new window to iOS forensics, but passcode recovery not yet possible
What if a forensic expert gets a locked iPhone from a crime scene? Yeah, details should be drawn out from the device to throw light on the misdeed. But with the Cupertino company patching up the vulnerabilities with each firmware overhaul, intruding into the OS is a bit far-fetched. Wait what! Elcomsoft, a mobile forensic tools developing company has found a way...
2 December, 2019 | MacTech - https://www.mactech.comhttps://www.mactech.com/2019/12/02/ios-forensic-toolkit-upgraded-to-version-5-20/
Elcomsoft has updated iOS Forensic Toolkit, its mobile forensic tool for extracting data from a range of Apple devices. Version 5.20 adds the ability to extract the file system and decrypt the keychain from select Apple devices running all versions of iOS from iOS 12 to iOS 13.3.
9 January, 2019 | iLounge - http://www.ilounge.com/Elcomsoft forensic tools can now extract Apple Health data from iCloud
For forensic investigators, access to Health data can provide additional useful evidence, including records of heart rate, sleeping habits, location points, workouts, steps, and walking routines.
15 October, 2018 | The INQUIRER - https://www.theinquirer.net/US cops warned not to gawp at iPhones due to Face ID lock-out
Don't look at the screen... or else', Elcomsoft warns law enforcement.
14 October, 2018 | Gizmodo - https://gizmodo.com/Investigators Told Not to Look at iPhones With Face ID to Avoid Lock-Out: Report
Elcomsoft’s CEO Vladimir Katalov told Motherboard the company advised never looking at the screen of an iPhone with Face ID in order to avoid losing one of five attempts before the phone reverts to requiring a passcode. This is because, as Motherboard notes:
13 October, 2018 | Cult of Mac - https://www.cultofmac.com/Cops warned to not even look at suspects’ iPhones
Elcomsoft warns cops to not look at iPhones involved in investigations because the iPhone will only allow five unsuccessful Face ID attempts before requiring a passcode. If those attempts are by police officers looking at the screen then the suspect can no longer be forced to unlock their own phone.
13 October, 2018 | Engadget - https://www.engadget.com/Police told to avoid looking at recent iPhones to avoid lockouts
Police have yet to completely wrap their heads around modern iPhones like the X and XS, and that's clearer than ever thanks to a leak. Motherboard has obtained a presentation slide from forensics company Elcomsoft telling law enforcement to avoid looking at iPhones with Face ID.
12 October, 2018 | Motherboard - https://motherboard.vice.com/Cops Told ‘Don’t Look’ at New iPhones to Avoid Face ID Lock-Out
“iPhone X: don’t look at the screen, or else… The same thing will occur as happened on Apple’s event,” the slide, from forensics company Elcomsoft, reads. Motherboard obtained the presentation from a non-Elcomsoft source, and the company subsequently confirmed its veracity.
10 July, 2018 | MailOnline - http://www.dailymail.co.uk/Police can STILL break into your iPhone without permission using a simple hack that bypasses Apple’s new iOS 11.4.1 'cracking defence tool'
The workaround was discovered by cybersecurity firm ElcomSoft, based in Moscow. ElcomSoft connected a compatible Lightning accessory, the official Lightning to USB 3 Camera Adaptor, before the screen had been locked for an hour.
10 July, 2018 | MacRumors - https://www.macrumors.com/Security Researchers Find Way to Prevent USB Restricted Mode From Activating on iOS Devices
Security researchers claim to have discovered a loophole that prevents an iPhone or iPad from activating USB Restricted Mode, Apple's latest anti-hacking feature in iOS 12 beta and iOS 11.4.1, which was released on Monday.