EFS-Encrypted Data Recovery
The Encrypting File System (EFS) was first introduced in Windows 2000 and, as Microsoft claims, is an excellent encryption system with no back door. However, the most secure encryption can be...
View ArticleElectronic records security and encryption
Sad information: Hackers grab more than 285M records in 2008. Just curious, how about Sarbanes-Oxley Act, does it really work?
View ArticleIntel Gulftown
New member of Core i7 family: six cores, hyper-threading, and some new instructions — including ones for AES encryption. Unfortunately, useless for our password-cracking purposes: most...
View ArticleDangerously Easy Password Recovery
There is only one way to break through PGP® encryption – GPU accelerated brute force – and that one is too many. New Elcomsoft Distributed Password Recovery v. 2.80.206 crunches PGP® passwords 200...
View ArticleEncryption and decryption from security law perspective (Part II)
In my previous post I suggested several variants of computer security translated by different laws. Now I’d like to get to ciphers…again viewed by law. So, how does the law see encryption and...
View ArticleOffice 2010: two times more secure
We are waiting for release of new Microsoft office suite – Office 2010. Right now Microsoft has only technical preview of new Office; this preview has been leaked from Microsoft and everyone can...
View ArticleHacking For Dummies, 3rd Edition by Kevin Beaver
Although this new book is on sale from January this year, we are happy to officially say our words of gratitude to Kevin Beaver and advise it to you. In his book Kevin insists that the best way to...
View ArticleAndroid Encryption Demystified
How many Android handsets are encrypted, and how much protection does Android encryption actually provide? With Android Nougat accounting for roughly 7% of the market, the chance of not being...
View ArticleHow to Extract and Decrypt Signal Conversation History from the iPhone
With over half a million users, Signal is an incredibly secure cross-platform instant messaging app. With emphasis on security, there is no wonder that Signal is frequently picked as a communication...
View ArticleSynology NAS Encryption: Forensic Analysis of Synology NAS Devices
Home users and small offices are served by two major manufacturers of network attached storage devices (NAS): QNAP and Synology, with Western Digital being a distant third. All Qnap and Synology...
View ArticleWhat is Password Recovery and How It Is Different from Password Cracking
Why wasting time recovering passwords instead of just breaking in? Why can we crack some passwords but still have to recover the others? Not all types of protection are equal. There are multiple types...
View ArticleAttached Storage Forensics: Security Analysis of TerraMaster NAS
TerraMaster is a relatively new company specializing in network attached storage and direct attached storage solutions. The majority of TerraMaster NAS solutions are ARM64 and Intel-based boxes aimed...
View ArticleIntroduction to BitLocker: Protecting Your System Disk
If you are a Windows user and ever considered protecting your data with full-disk encryption, you have probably heard about BitLocker. BitLocker is Microsoft’s implementation of full-disk encryption...
View ArticleBreaking LUKS Encryption
LUKS encryption is widely used in various Linux distributions to protect disks and create encrypted containers. Being a platform-independent, open-source specification, LUKS can be viewed as an...
View ArticleIt’s Hashed, Not Encrypted
How many times have you seen the phrase: “Your password is securely encrypted”? More often than not, taking it at face value has little sense. Encryption means the data (such as the password) can be...
View ArticleNAS Forensics: QNAP Encryption Analysis
A year ago, we analyzed the encryption used in Synology NAS devices. We were somewhat disappointed by the company’s choice to rely on a single encryption layer with multiple functional restrictions and...
View ArticleEnd-to-End Encryption in Apple iCloud, Google and Microsoft Accounts
The proliferation of always connected, increasingly smart devices had led to a dramatic increase in the amount of highly sensitive information stored in manufacturers’ cloud accounts. Apple, Google,...
View ArticleProtecting Linux and NAS Devices: LUKS, eCryptFS and Native ZFS Encryption...
Many Linux distributions including those used in off the shelf Network Attached Storage (NAS) devices have the ability to protect users’ data with one or more types of encryption. Full-disk and...
View ArticleDecrypting Password-Protected DOC and XLS Files in Minutes
Accessing the content of password-protected and encrypted documents saved as DOC/XLS files (as opposed to the newer DOCX/XLSX files) is often possible without time-consuming attacks regardless of the...
View Article
More Pages to Explore .....