19 March, 2021 | Help Net Security - https://www.helpnetsecurity.com/ElcomSoft iOS Forensic Toolkit extracts data from Apple devices without a jailbreak
ElcomSoft updates iOS Forensic Toolkit, the company’s mobile forensic tool for extracting data from a range of Apple devices. Version 7.0 expands the ability to perform full file system extraction without the need to install a jailbreak, adding support for recent versions of iOS including iOS 14 through 14.3 on all devices including the current iPhone 12 range.
18 March, 2021 | Mac Observer - https://www.macobserver.com/iOS 14 Isn’t Safe From Forensic Extraction Technology
Elcomsoft has announced an update to its iOS Forensic Toolkit, with version 7.0 working on iPhone 12 models and iOS 14 through iOS 14.3.
30 April, 2020 | Help Net Security - https://www.helpnetsecurity.com/Elcomsoft Phone Viewer 5.0 gains the ability to display conversation histories and secret chats in Telegram
ElcomSoft updates Elcomsoft Phone Viewer, the company’s forensic extraction tool. Version 5.0 gains the ability to display conversation histories and secret chats in Telegram, one of the world’s most popular instant messaging apps.
11 March, 2020 | Vice - https://www.vice.com/We Built a Database of Over 500 iPhones Cops Have Tried to Unlock
In some cases, investigators obtained photos, text messages, call records, browsing data, cookies, and location data from seized iPhones. Some executed search warrants explicitly mention the type of extraction performed, such as so-called "Logical" or "Advanced Logical" extraction. The latter is a term with a meaning that varies between different phone data extraction companies, but generally it relates to creating a device backup as iTunes does normally and obtaining some more data on top of that, Vladimir Katalov, the CEO of iOS forensics firm Elcomsoft, told Motherboard. Katalov said those backups can contain the sorts of pieces of data that investigators obtained, and is available to all models of iPhone.
28 January, 2020 | Macworld - https://www.macworld.co.uk/How to bypass a forgotten passcode on iPhone or iPad
We tested Elcomsoft iOS Forensic Toolkit and found it a reliable means of cracking an iPad's passcode. The software is not available to the general public and you will need to apply for a licence (and show your credentials). Software tools like this can enable you to extract a passcode from an iOS device, but you'll need to be good with computers (or at least capable of handling yourself using the Command Line in Terminal).
22 January, 2020 | Vice - https://www.vice.com/Here Is the Technical Report Suggesting Saudi Arabia’s Prince Hacked Jeff Bezos’ Phone
“Looks like [the] experts were not qualified enough,” Vladimir Katalov, CEO of iOS forensics firm Elcomsoft, told Motherboard.
21 January, 2020 | Computerworld - https://www.computerworld.com/Feds may already have found a way to hack into Apple iPhones
Vladimir Katalov, CEO of Russian forensic tech provider ElcomSoft, called Barr's request unrealistic because Apple can’t “technically” unlock iPhones because of file-based encryption and secure enclave technology; it boots up separately from iOS and runs its own microkernel not directly accessible by the iPhone operating system.
21 January, 2020 | AppleInsider - https://appleinsider.com/What Apple surrenders to law enforcement when issued a subpoena
Or that's what Apple says, at least. According to data forensics company ElcomSoft, iCloud backups are "inherently much less secure" than users would hope. "If you have iCloud backups enabled, the encryption key for iMessages will be stored in the backup," the company says in a blog.
23 December, 2019 | Mashable - https://mashable.com/Company Says It Can Extract Email Addresses, Passwords From Locked iPhones
Elcomsoft, which creates digital forensic software for governments and law enforcement agencies, said on Friday that its iOS Forensic Toolkit can now extract some data from locked iPhones and iPads in Before First Unlock (BFU) mode.