June 27th, 2025 by Oleg Afonin
Apple’s unified logging system offers a wealth of information for forensic investigators analyzing iOS, iPadOS, watchOS, tvOS, and other devices from Apple ecosystems. Originally designed for debugging and diagnostics, these logs capture a continuous stream of detailed system activity – including app behavior, biometric events, power state changes, and connectivity transitions. In digital forensics, where traditional sources of evidence like backups or app data may be encrypted or inaccessible, the logs provide an alternative and often untapped reservoir of forensic artifacts. This article explores the content, availability, and forensic value of Apple logs collected via sysdiagnose across different device types, focusing on practical methods for extraction and analysis using modern forensic tools.
June 8th, 2009 by Olga Koksharova
He started from hacking for fun (cracking phone systems), then he founded DefCon and Black Hat hacker conferences (btw, we had a chance to visit DefCon9 in 2001) and now Jeff Moss is chosen to take care of US cyber security affairs. No doubt, Jeff Moss has the guts to resist cyber terrorism and protect national interests. Good luck, Jeff!
June 8th, 2009 by Olga Koksharova
Securing home Wi-Fi remains uncertain when it comes to law. Some urge users are not liable when they use default security settings and it is manufacturer who is guilty when/if wireless network was ‘successfully’ abused. Others put whole responsibility on users. This is practically a question to law and usually its resolution depends on lawyers’ skills to gather and manipulate the details. Your security encompasses not only security against the law when you happen to fall a victim to an intruder, but also protection against that very intruder. In the long run, it’s up to you whether to endeavor to prove your innocence or take measures to build a reliable fence.
June 6th, 2009 by Vladimir Katalov
Latest rumors about iPhone: probably, it will have 3D Graphics Chip in it, according to Fudzilla article. Let’s hope that it will be CUDA-enabled, so we can make GPU-accelerated password cracker for it 😉
June 6th, 2009 by Vladimir Katalov
Sorry I did not write blog for some time… Just returned from one-week vacation at Rhodos (Greece).
June 5th, 2009 by Olga Koksharova
Jerry Fishenden, Microsoft National Technology Officer in the UK leaves his post to work on his own. He intends to elaborate “a guidebook for politicians and policymakers about what does and doesn’t work in terms of delivering an effective technology policy”.
June 5th, 2009 by Andrey Belenko
When it comes to Larrabee one of most intriguing things is its performance. Official information provided by Intel was not enough to get good estimation. In my previous post I’ve estimated it as "roughly equivalent to GTX 295". Well, it seems I was too optimistic. Latest rumors are that current Larrabee samples deliver same performance as GTX 285.
June 3rd, 2009 by Olga Koksharova
It looks like AMD has outrun NVIDIA today. Its World’s First Microsoft DirectX® 11 Graphics Processor, presented a few hours ago in Taipei, is currently the best hardware for Windows 7. Catch up, NVIDIA! However not many details of it suggested. At least enjoy the graphics:
June 3rd, 2009 by Olga Koksharova
ElcomSoft is launching a survey intended to collect more information on how people handle their passwords, which remain a major way for user authentication. Whether you are ElcomSoft customer or haven’t seriously thought about password security, we hope you will answer our questions.
June 3rd, 2009 by Katerina Korolkova, Direktur Humas
The summer has begun, and as usual at this time of the year big companies present the results of hard work to the public. With Microsoft’s Bing and Google Wave flooding the news, you might have overlooked the joint release of NVIDIA and Supermicro. At Computex 2009 in Taipei, Taiwan, Nvidia and Supermicro announced