All USB Cables Are Equal, But Some Are More Equal Than Others

October 17th, 2025 by Elcomsoft R&D

As we outlined in the previous article (Effective Disk Imaging: Ports, Hubs, and Power), it’s better to connect external USB-C devices (such as adapters and especially write-blockers) to a USB-C port that complies with at least the USB 3.2 Gen2 specs (10 Gbit/s). But what if your computer only has USB-A ports, or only a USB-A port is free? Obviously, you’ll need a USB-C to USB-A cable – but you’ll need to choose the right one very carefully, and that’s not the only thing that matters.

Read the rest of this entry »

0-day

June 21st, 2010 by Andrey Belenko

It’s been two weeks since Steve Jobs has announced release of new iPhone 4 and iOS 4 operating system during his keynote on WWDC’2010. New iPhone will begin shipping on Thursday, 24th of June, and new iOS will become available for download today, just few hours are left.

Read the rest of this entry »

Password Usage Behavior Survey, Take 2

June 15th, 2010 by Olga Koksharova

Hello! Yet again, we have launched a survey on password usage behavior.

Read the rest of this entry »

‘Casual and Secure’ Friday Post

May 14th, 2010 by Katerina Korolkova, Direktur Humas

German law has always been strict about any possible security breaches. This week German court ordered that anyone using wireless networks should protect them with a password so the third party could not download data illegally.  

Read the rest of this entry »

ATI is at it. Again.

May 12th, 2010 by Andrey Belenko

Two months ago I wrote a blog post "ATI and NVIDIA: Making Friends out of Enemies" where (among other things) I wrote:

Read the rest of this entry »

Elcomsoft iPhone Password Breaker

May 7th, 2010 by Andrey Belenko

Last week we have released our new product, EPPB, out of beta. We have fixed some bugs, polished GPU acceleration support, added support for Tableau TACC1441 hardware accelerator, making this program the world's first program capable of utilizing computing power of GPUs both from ATI and NVIDIA as well as dedicated hardware accelerators aimed primarily on computer forensics specialists. We have also included ability to run brute-force attacks and not only wordlist-based attacks. Latter were improved with ability to enable/disable individual types of password mutations and set customized level to any of them.

Read the rest of this entry »

ElcomSoft at EuroForensics 2010 in Turkey

April 2nd, 2010 by Alexandra Tsybulskaya

Hurrying to inform you about our adventures in one of the most beautiful cities of Euro-Asian region, Istanbul. This March we were lucky to have a chance of participating in a big forensics and security focused international event in Turkey, namely EuroForensics 2010, thanks to our Turkish partners Forensic People, organizers & hosts of the event.

Read the rest of this entry »

ATI and NVIDIA: Making Friends out of Enemies

March 12th, 2010 by Andrey Belenko

There had been a long standing competition between NVIDIA and ATI which has lasted for years now. And there is no winner so far — just like with Windows vs. Linux or PC vs. Mac debate there are ones who prefer the former and others who prefer the latter. Kind of «religious» issue.

Read the rest of this entry »

New password-cracking hardware

February 19th, 2010 by Vladimir Katalov

Some time ago we wrote about the smallest password cracking device. Not suitable for you? No problem, here is another one: not as small, but definitely more powerfull: Audi. Yes, it's a car. No, we're not kidding. Just read NVIDIA and Audi Marry Silicon Valley Technology with German Engineering press release from NVIDIA. Or if you need more information, The New MMI Generation from Audi might be also helpful. In brief: Audi A8 luxury sedan is equipped with an entertainment system that uses two GPUs from NVIDIA. We have no idea what are these chips (may be Fermi?) and is it technically possible to load our own code to them, but still funny, isn't it? 🙂

Read the rest of this entry »