Apple Ecosystem: Overlooked Devices

June 18th, 2025 by Oleg Afonin

When it comes to digital evidence, most investigators naturally focus on smartphones – and occasionally tablets. But the rest of the Apple ecosystem often goes unnoticed: Apple Watch, Apple TV, HomePod, even older iPod Touch models. These supplementary devices might seem irrelevant, but they can contain valuable digital artifacts: activity logs, Wi‑Fi credentials, leftover bits and pieces of information, system logs, and even synced photos.

Read the rest of this entry »

Apple Two-Factor Authentication and the iCloud

May 30th, 2013 by Vladimir Katalov

Finally, two-factor authentication is not a silver bullet. There are scenarios where two-factor authentication simply is not enough. But still, it is a good idea to enable 2FA on all your accounts.

Read the rest of this entry »

iCloud backups inside out

February 25th, 2013 by Vladimir Katalov

It’s been a while since we released the new version of Elcomsoft Phone Password Breaker that allows downloading backups from iCloud (read the press release). Many customers all over the world are already using this new feature intensively, but we still get many questions about its benefits, examples of cases when it can be used and how to use it properly. We also noticed many ironic comments in different forums (mostly from users without any experience in using iOS devices and so have no idea what iCloud backups actually are, I guess), saying that there is nothing really new or interesting there, because anyone with Apple ID and password can access the data stored in iCloud backup anyway.

Read the rest of this entry »

Yahoo!, Dropbox and Battle.net Hacked: Stopping the Chain Reaction

February 14th, 2013 by Vladimir Katalov

Major security breaches occur in quick succession one after another. Is it a chain reaction? How do we stop it?

Read the rest of this entry »

Déjà vu

December 24th, 2012 by Vladimir Katalov

The story about PGP becomes really funny.

Read the rest of this entry »

ElcomSoft Decrypts BitLocker, PGP and TrueCrypt Containers

December 20th, 2012 by Vladimir Katalov

BitLocker, PGP and TrueCrypt set industry standard in the area of whole-disk and partition encryption. All three tools provide strong, reliable protection, and offer a perfect implementation of strong crypto.

Read the rest of this entry »