Full file system extraction for iOS 16.0–16.3.1 with Elcomsoft’s iOS Forensic Toolkit

2023-07-27T16:35:31-06:00June 29th, 2023|Tags: , , , , , , , |

The latest update to Elcomsoft's iOS Forensic Toolkit 8.30 (Mac) and 7.90 (Windows/Mac) brings great news for investigators and forensic professionals. We are excited to announce the low-level file system extraction support for compatible Apple devices running iOS/iPadOS 16.0 through [...]

Learn why Forrester Wave Ranks Harmony as a Leader in Email Security and DLP

2023-07-27T13:10:49-06:00June 28th, 2023|Tags: , , , , , , , , , , |

Harmony Email Security and Collaboration was recently recognized as a leader by Forrester Research in Enterprise Email Security. In the Forrester 2023-Q2 Wave Report, Check Point Harmony Email & Collaboration secured a position as a leader. For 40 years, Forrester’s [...]

Magnet AXIOM Cyber 7.2 Is Now Available

2023-06-23T12:36:05-06:00June 23rd, 2023|Tags: , , , , , , , , , , , , , |

In this release, we have added support for SHA256 hash calculations, an improved the viewer for LevelDB files, and added new and updated artifacts to keep your evidence sources current with the latest corporate applications and services. Try AXIOM Cyber for [...]

Passware Kit Mobile 2023 v4 Now Available

2023-06-23T16:15:43-06:00June 22nd, 2023|Tags: , , , , , , , , |

What is new? GPU-accelerated password recovery for 30+ Qualcomm-based devices Application data extraction from Samsung, LG, Xiaomi, and other Qualcomm-based devices Email notification on the password recovery result Support for iOS 15.7.6 on iPhone 7, SE, and other A8/A9/A10 devices [...]

Email Malware Detection and Remediation:Tools and Techniques for Securing Your Communication

2023-06-26T17:54:47-06:00June 7th, 2023|Tags: , , , , , , |

Email malware poses a significant threat to individuals and organizations, necessitating robust detection and remediation strategies to ensure secure communication channels. Detecting and remediating email malware requires a multi-layered approach, combining advanced security tools and techniques. This article explores the [...]

Go to Top