Quantcast
Channel: Encryption – ElcomSoft blog
Browsing all 19 articles
Browse latest View live

EFS-Encrypted Data Recovery

The Encrypting File System (EFS) was first introduced in Windows 2000 and, as Microsoft claims, is an excellent encryption system with no back door. However, the most secure encryption can be...

View Article



Image may be NSFW.
Clik here to view.

Electronic records security and encryption

Sad information: Hackers grab more than 285M records in 2008. Just curious, how about Sarbanes-Oxley Act, does it really work?

View Article

Intel Gulftown

New member of Core i7 family: six cores, hyper-threading, and some new instructions — including ones for AES encryption. Unfortunately, useless for our password-cracking purposes: most...

View Article

Image may be NSFW.
Clik here to view.

Dangerously Easy Password Recovery

There is only one way to break through PGP® encryption – GPU accelerated brute force – and that one is too many. New Elcomsoft Distributed Password Recovery v. 2.80.206 crunches PGP® passwords 200...

View Article

Image may be NSFW.
Clik here to view.

Encryption and decryption from security law perspective (Part II)

In my previous post I suggested several variants of computer security translated by different laws. Now I’d like to get to ciphers…again viewed by law. So, how does the law see encryption and...

View Article


Image may be NSFW.
Clik here to view.

Office 2010: two times more secure

We are waiting for release of new Microsoft office suite – Office 2010. Right now Microsoft has only technical preview of new Office; this preview has been leaked from Microsoft and everyone can...

View Article

Image may be NSFW.
Clik here to view.

Hacking For Dummies, 3rd Edition by Kevin Beaver

Although this new book is on sale from January this year, we are happy to officially say our words of gratitude to Kevin Beaver and advise it to you. In his book Kevin insists that the best way to...

View Article

Android Encryption Demystified

How many Android handsets are encrypted, and how much protection does Android encryption actually provide? With Android Nougat accounting for roughly 7% of the market, the chance of not being...

View Article


Image may be NSFW.
Clik here to view.

How to Extract and Decrypt Signal Conversation History from the iPhone

With over half a million users, Signal is an incredibly secure cross-platform instant messaging app. With emphasis on security, there is no wonder that Signal is frequently picked as a communication...

View Article


Image may be NSFW.
Clik here to view.

Synology NAS Encryption: Forensic Analysis of Synology NAS Devices

Home users and small offices are served by two major manufacturers of network attached storage devices (NAS): QNAP and Synology, with Western Digital being a distant third. All Qnap and Synology...

View Article

What is Password Recovery and How It Is Different from Password Cracking

Why wasting time recovering passwords instead of just breaking in? Why can we crack some passwords but still have to recover the others? Not all types of protection are equal. There are multiple types...

View Article

Image may be NSFW.
Clik here to view.

Attached Storage Forensics: Security Analysis of TerraMaster NAS

TerraMaster is a relatively new company specializing in network attached storage and direct attached storage solutions. The majority of TerraMaster NAS solutions are ARM64 and Intel-based boxes aimed...

View Article

Image may be NSFW.
Clik here to view.

Introduction to BitLocker: Protecting Your System Disk

If you are a Windows user and ever considered protecting your data with full-disk encryption, you have probably heard about BitLocker. BitLocker is Microsoft’s implementation of full-disk encryption...

View Article


Image may be NSFW.
Clik here to view.

Breaking LUKS Encryption

LUKS encryption is widely used in various Linux distributions to protect disks and create encrypted containers. Being a platform-independent, open-source specification, LUKS can be viewed as an...

View Article

Image may be NSFW.
Clik here to view.

It’s Hashed, Not Encrypted

How many times have you seen the phrase: “Your password is securely encrypted”? More often than not, taking it at face value has little sense. Encryption means the data (such as the password) can be...

View Article


Image may be NSFW.
Clik here to view.

NAS Forensics: QNAP Encryption Analysis

A year ago, we analyzed the encryption used in Synology NAS devices. We were somewhat disappointed by the company’s choice to rely on a single encryption layer with multiple functional restrictions and...

View Article

Image may be NSFW.
Clik here to view.

End-to-End Encryption in Apple iCloud, Google and Microsoft Accounts

The proliferation of always connected, increasingly smart devices had led to a dramatic increase in the amount of highly sensitive information stored in manufacturers’ cloud accounts. Apple, Google,...

View Article


Image may be NSFW.
Clik here to view.

Protecting Linux and NAS Devices: LUKS, eCryptFS and Native ZFS Encryption...

Many Linux distributions including those used in off the shelf Network Attached Storage (NAS) devices have the ability to protect users’ data with one or more types of encryption. Full-disk and...

View Article

Image may be NSFW.
Clik here to view.

Decrypting Password-Protected DOC and XLS Files in Minutes

Accessing the content of password-protected and encrypted documents saved as DOC/XLS files (as opposed to the newer DOCX/XLSX files) is often possible without time-consuming attacks regardless of the...

View Article
Browsing all 19 articles
Browse latest View live




Latest Images