Recent News
Category: Other

MDaemon Messaging Server is more than just an email server. It provides industry-leading reliability and security at an affordable price, which is why businesses have been entrusting it with their communication needs for two decades already. Streamlining communication and collaboration, the email server supports the three major protocols (SMTP, POP3 and IMAP) and provides a high level of performance that you can depend on. It also delivers an exceptionally low total cost of ownership thanks to it being designed specifically to meet the needs of small and medium businesses. It's also available in multiple languages and comes with support for multiple domains, content filtering, mailing lists and flexible, central administration features.

Lock Down Your Communications with Best-in-class Security

These days, no organization can afford to let security take a backseat when hackers are hard at work trying to find and exploit vulnerabilities in your systems. Given the enormous reliance on email as the preferred medium for corporate communications, it's imperative that you lock down your email service to prevent data breaches and confidential information leakage. MDaemon Messaging Server provides robust email security using relay controls, IP shielding, multifactor authentication, reverse lookups and more. It also allows you to encrypt all emails and attachments on the client side. On the server side, administrators can enable controls that allow them to automate encryption, decryption and key management through PGP support. Furthermore, to address compliance regulations facing many businesses and industry sectors, email archiving is built in, and it's fully customizable to meet the needs for your business and the specific set of regulations facing it.

Manage Company- and Employee-Owned Mobile Devices with Ease

Did you know that more than half of all the time spent online is through a mobile device? Now that smartphones and tablets are so ubiquitous in the consumer world, they're started making a profound impact in business environments too. Nowadays, many companies maintain a large fleet of their own mobile devices, while also allowing their employees to use their own devices by way of a bring your own device (BYOD) policy. The challenges lies in keeping track of information inputted from such a large number of different platforms and device types. Fortunately, MDaemon Messaging Server provides instant wireless access to your emails, calendars, contacts and task lists so that your employees have access to all the information they need to do their jobs no matter where they are.

Improve Collaboration with Instant Messaging and Webmail

Included free with MDaemon Messaging Server is a closed instant messaging desktop application app that, unlike many of the mainstream IM clients, provides complete security and privacy. This makes it a safe and easy way for your team members to keep in touch with each other while they're on the move. It also provides secure file-sharing, group chat, address book synchronization, logging and integration with the included MDaemon Webmail service.

Finally, if you're moving from a Microsoft Exchange email server to MDaemon, you don't have to worry about any migration woes. There is a built-in migrator feature that's designed specifically to move you from one server to the other in just a few steps, without the downtime that often comes with such processes. Learn more at

Download Now
Author: mdaemonComments (0)
Category: Other

Elcomsoft Phone Breaker 8.30 is updated to support the extraction of iMessages that are synced to iCloud by iPhone devices running iOS 11.4 and newer. Elcomsoft Phone Breaker is the first forensic tool on the market to access and decrypt iMessage conversation histories from the cloud.


In iOS 11.4, Apple added a major feature advertised almost a year ago during iOS 11 announce. iMessages are now automatically synchronized across all enrolled devices on the user's Apple ID using iCloud. iCloud sync works similar to existing synchronizations such as iCloud Keychain, iCloud Photo Library or iCloud contacts.

The iCloud synchronization mechanism is separate from Continuity, and works in addition to iCloud system backups. Unlike daily iCloud backups, synchronization happens near instantly. If the device has an Internet connection, information is updated with little or no delay. This enables near real-time remote access to iMessages sent and received by the user.

iMessages Unavailable With GDPR Requests

Since May 25, Apple began allowing users to request information available in their Apple account thanks to the company's GDPR compliance. However, even for European customers, iMessages are not included with GDPR data requests. According to Apple (, "your messages are encrypted on your device and can't be accessed by anyone without your device passcode".

While it is true that iMessages cannot be accessed by anyone without device passcode, it does not appear that iMessages stored in iCloud are encrypted with a key derived from the passcode as discussed in the following article: iCloud and iMessage Security Concerns (

iMessage Extraction

Elcomsoft Phone Breaker 8.30 offers the ability to extract iMessages from the user's iCloud account. The user's iCloud/Apple ID authentication credentials are required to access iCloud data, as well as the secondary authentication factor for passing the Two-Factor Authentication prompt. In addition, one must provide a passcode (iPhone/iPad) or system password (Mac) from one of the enrolled devices.

In addition to iMessages, Elcomsoft Phone Breaker can extract iCloud Keychain as well as many types of synchronized data including call logs, Safari data (browsing history, open tabs and bookmarks), calendars, notes and contacts, Apple Maps, Wallet and iBooks data.

iMessage sync is exclusively available on Apple accounts with Two-Factor Authentication. As a result, access to the secondary authentication factor is mandatory when pulling iMessages from iCloud. In addition, a valid passcode or system password is required from one of the user's devices enrolled in iMessage sync.

About Elcomsoft Phone Breaker

Elcomsoft Phone Breaker is an all-in-one mobile acquisition tool to extract information from a wide range of sources. Supporting offline and cloud backups created by Apple, BlackBerry and Windows mobile devices, the tool can extract and decrypt user data including cached passwords and synced authentication credentials to a wide range of resources from local backups. Cloud extraction with or without a password makes it possible to decrypt FileVault 2 containers without lengthy attacks and pull communication histories and retrieve photos that've been deleted by the user a long time ago.

Pricing and Availability

Elcomsoft Phone Breaker 8.30 is available for both Windows and macOS. Home, Professional and Forensic editions are available. iCloud recovery support is only available in Professional and Forensic editions, while password-free iCloud access as well as the ability to download arbitrary information from iCloud and iCloud Drive are only available in the Forensic edition. Two-Factor Authentication is available in all editions. Elcomsoft Phone Breaker Pro is available to North American customers for $199. The Forensic edition enabling over-the-air acquisition of iCloud data and support for binary authentication tokens is available for $799. The Home edition is available for $79. Local pricing may vary.The update is free of charge to all customers who purchased or renewed their Elcomsoft Phone Breaker or Elcomsoft Mobile Forensic Bundle license within one year. Discounted renewal is available to customers whose maintenance plan has already expired.

System Requirements

Elcomsoft Phone Breaker supports Windows 7/8/8.1/10 as well as Windows 2008/2012/2016 Server. The Mac version supports Mac OS X 10.7 and newer. Elcomsoft Phone Breaker operates without Apple iTunes or BlackBerry Link being installed. In order to access iCloud Keychain, Windows users must have iCloud for Windows installed, while Mac users must run macOS 10.11 or newer.

Download Now
Author: phonebreComments (0)
Category: Other

Elcomsoft Phone Viewer 3.70 is a major update over all previous versions of the tool. In this update, we've added support for the TAR images that are saved as the result of physical acquisition performed with Elcomsoft iOS Forensic Toolkit and other forensic tools such as GrayKey. In addition to viewing TAR images, Elcomsoft Phone Viewer 3.70 adds an aggregated view for location data extracted from multiple sources.

Viewing iOS Forensic Toolkit TAR Files

Since the introduction of the iPhone 5s, Apple's first 64-bit iPhone, physical acquisition has never been the same. For all iPhone and iPad devices equipped with Apple's 64-bit processors, physical acquisition is exclusively available via file system imaging. The imaging is performed on the device itself in order to bypass full-disk encryption. Regardless of the tool performing physical acquisition, the result of these efforts is always a TAR archive containing an image of the device's file system. Elcomsoft iOS Forensic Toolkit produces TAR files as the result of the "T" (Tarball) command.

Up until now, most tools available for analysing information inside these TAR images were integral parts of fully-featured forensic toolkits. Your options would be limited to either time-consuming and labour-intensive manual analysis requiring a high level of expertise, or a highly sophisticated and complex forensic suite, with nothing in between. Elcomsoft Phone Viewer 3.70 offers the lightweight and convenient third option, enabling fast and easy analysis of evidence found in the results of physical acquisition.

Aggregated Location Data

Elcomsoft Phone Viewer 3.70 brings location analysis to a whole new level, adding a new aggregated view to help experts analyse the user's location history based on evidence extracted from multiple sources. The current release extracts and aggregates location information from all of the following sources:

  • Frequent/significant locations

  • Locations cache (3G/LTE/Wi-Fi connections)

  • Apple Maps

  • Google Maps

  • EXIF in media files

  • Calendar events

  • The UBER app

By accessing location data gathered from such a wide range of sources, experts are no longer limited to evidence collected from just the location logs. Some sources are only available with physical extraction (TAR files), and some data may be limited when analyzing backups. The number of supported sources of location data will be growing in future releases of Elcomsoft Phone Viewer.

Get more information on Elcomsoft Phone Viewer and download free trial version at

Download Now
Author: elcomviewerComments (0)
Category: Other

If you have a multilingual website or program, you may have been in a situation where you needed to quickly translate three lines of text into a dozen languages and do so with top quality: You might have wanted to tell your users about changes in a new version of your software, announce some good news to subscribers or site visitors, or make small edits in resource strings or the UI.

The adaptation of a website or program for foreign audiences has always been a major headache for developers. After all, such a task is far from trivial.

Every translation task should be approached professionally with attention to cultural differences, religious customs, differences in mentalities and other factors. First and foremost, it applies to advertisements and marketing texts, and, to a lesser degree, to technical ones.

Serious translation agencies employ the translator-editor-corrector process, which results in top quality. However, the price can be high. On the other hand, you won't engage a large organization for the translation of a tiny piece of text. That would be overkill. Few agencies would agree to do it, but even if one did, the price would be steep.

Neither is it a good idea to take Cheapskate Alley, because you'll risk losing more than you save. A cheap translation reads like the manual for a cheap Chinese phone, so it won't do your product any good. Native speakers will scoff at inappropriately used idioms or an excessively bookish style.

It seems there's just one option, which is to use native speakers for translations.

In essence, it all boils down to finding 15 translators and convincing them to help you with one or two sentences. These people should be reliable and know the subject matter. Otherwise, you may see something like "stealing techniques" instead of "steeling techniques."

So, how do you quickly find an English, French, German, Italian, Japanese translator plus ten other "Greeks"?

This immensely complex task can be solved in a few minutes. A half an hour later, you'll have 15 high-quality translations by native speakers. Doesn't that sound intriguing?

Meet Nitro, the service for the professional translation of short texts by native speakers.

Nitro was created to help people quickly translate a couple of paragraphs of text, which, in our case, is just what the doctor ordered. Text is translated very quickly, often within minutes. There is no limitation as to minimum text, so you're free to submit a single string or sentence. You can even translate a single word! There's no other service quite like Nitro.

The system currently supports 70 languages. Each of your translations will be to-the-point, accurate and grammatically correct.

Nitro uses the crowd-sourcing concept. Each translation pair is associated with a group of tried-and-tested translators encompassing more than 300 experts in their native countries, on different continents and in different time zones. So, orders are accepted around the clock, even at night. The first available translator will pick up your text right away.

The service is very easy to use. Simply sign up, enter the original text in the corresponding area and wait for the order to be completed. Soon you'll get the translation in English, French, Chinese or another requested language in your account or mailbox. If necessary, you can provide comments for the translator in a separate field before submitting your order.

We use the pay-per-word system, and translation fees are charged to your account. Your account balance can be refilled via bank wire, with a bank card or an electronic payment system such as Webmoney, Yandex.Money or PayPal.

Take advantage of cutting-edge technologies today. Localize your software and websites with the help of our professional, native-speaking translators.

Get started today! Place your first order in Nitro, the professional--and live--online translation service!
Download Now
Author: alconostincComments (0)
Category: Other

Many of us use our computers for things like online shopping and banking, as well as for a multitude of other activities that involve the storage and transmission of sensitive data. In fact, most computers hold a raft of confidential information ranging from login and payment details to private photos and other files. What most people don't realize is that simply deleting such files from the Recycle Bin or formatting the drive doesn't permanently remove them from the disk. In fact, all the original data will remain hidden on the drive until another operation overwrites it. With some storage devices, the original data needs to be overwritten multiple times to ensure that it will never be recoverable. Otherwise, with the right software at their disposal, someone might be able to recover deleted data from your drive, which could spell disaster if you're planning to sell or donate your computer.

How Does Hard Drive Sanitation Work with [email protected] KillDisk?

It's simply not practical or even safe to rely on the recycle bin or formatting alone, and neither can you rely on securely deleting a single file. That's because multiple pieces of the file may be stored in different physical locations on the disk as such that it becomes fragmented. You can, of course defragment the drive before securely deleting specific content, but it's not a particularly reliable method. Furthermore, if you're using a solid-state drive, defragmenting it can shorten its lifespan, and it serves no purpose when it comes to improving performance, unlike with a mechanical hard drive. That's why the most effective way to securely erase data is to securely wipe the entire hard drive using an industry-leading data sanitation solution like [email protected] KillDisk. This software works by overwriting every editable sector of the drive with zeros, using multiple passes to guarantee that the original data will never be recoverable.

The result of many years of research and development, [email protected] KillDisk is a product from LSoft Technologies, one of the world's leading developers of disk utilities, including both data recovery and disk sanitation software. As such, it is especially effective at securely wiping data. The latest edition, version 11.1, was released in May 2018, and sports many improvements that make it easier to use and more reliable than ever before. It now provides improved handling of certificates and reports, which you can use to verify that a drive has undergone the proper process of disk sanitation as per industry-recognized standards. The included Boot Disk tool, which provides a self-contained operating environment, has also been updated with many tweaks to the user interface. Based on the familiar Windows 10 environment, it offers extensive customization and more.

[email protected] KillDisk is also ready for industrial use thanks to its new licensing policy, which allows you to erase multiple drives in parallel. This means that customers can enjoy practically unlimited scalability without having to rely on multiple tools and upgrades whenever they run into increasing workload demands. If you're ready to get started with the latest version or test out the free trial edition, pay a visit to today.

Download Now
Author: alexromodComments (0)
Category: Other

Many of us have experienced that dreaded feeling of being unable to start up the computer and then wondering whether all the files on the hard disk have disappeared as well. Whether you've fallen victim to a malicious software attack, your hardware has failed, or just plain old human error is to blame, you might assume that your only option left is to format the drive and start over or, if necessary, replace any component parts. Another option is to use your original operating system DVD or other media or a startup disk, but these are rarely effective. Furthermore, starting from scratch means losing everything on the drive, at least if you're planning to reinstall the operating system. Fortunately, there is another option before you start thinking about taking your computer in to a technician.

Start Up Your Computer with an Independent Operating Environment

[email protected] Boot Disk works because it doesn't rely on your operating system like most software. Instead, it comes in the form of a bootable disk with its own self-contained operating environment that works independently of your hard drive. As such, it allows you to start up a computer that otherwise won't boot or even has no operating system installed. In fact, you can also use it even if you don't have a hard disk installed in the machine. Based on the Windows 10 build 1709 environment, you'll be greeted with an instantly familiar interface complete with extensive customization options, including the ability to configure desktop shortcuts for custom tools and create your own user menus. Your preferences can be saved to a USB drive and restored whenever you boot up, no matter which system you're using.

Access All the Latest Disk Utilities from LSoft Technologies

Whether your goal is to recover data from a damaged or formatted hard drive or to securely erase data so that it can never be recovered, this suite of powerful tools has you covered. You can recover and reorganize partitions, back up your data, recover individual files, change and access passwords and even make full byte-by-byte images of your entire hard drive or other storage media. [email protected] Boot Disk includes the latest versions of Disk Image, UNDELETE, File Recovery, Partition Recovery and Password Changer. All tools are easy to use and provide advanced features for expert users as well. In addition to the robust lineup of disk utility tools, it ships with various everyday applications, including a calculator, notepad, image viewer, document viewer, task manager, registry editor and partition manager. There are also internet utilities, such as a web browser, and various networking utilities allowing you to configure your network.

How to Recover or Securely Delete Data

Many people don't realize that conventional methods of deleting data, such as by formatting a drive or emptying the recycle bin, don't delete anything. All these operations do is alter the master file table, which is effectively a database containing the locations and information about different files and folders. Nothing gets deleted until it is overwritten, and sometimes data even needs to be overwritten multiple times to ensure it will never be recoverable. If you want to recover deleted data, the included UNDELETE, File Recovery and Partition Recovery can exploit this opportunity to help you get back what you've lost. On the other hand, if you want to ensure that data will never be recovered, you can use the included KillDisk utility to sanitize the entire drive.

If you're looking for a complete set of disk utility tools, visit today.

Download Now
Author: bootdiskComments (0)
Category: Other

Most of us have experienced that gut-wrenching feeling when we've emptied the recycle bin or formatted a disk only to realize once it's already too late that something important got deleted. In fact, accidental data deletion is one of the most common IT support issues that businesses and individuals have. Even if it's not accidental, malicious software and hackers continue to wreak havoc on both business and personal devices to the extent that everyone needs to prioritize backup. Furthermore, you can't afford to take things like firewalls and antivirus software for granted. Also, hard drives, particularly solid-state drives with their limited number of read/write cycles, can fail at any moment without notice, especially if they've had a lot of use. These are just a few reasons why you always need a robust backup solution as your last line of defense. After all, failing to plan is planning to fail!

How Disk Imaging Software Helps Keep Your Data Safe

Backing up your precious files isn't simply a matter of copying over the contents of your documents folder onto a flash drive. In most cases, there will be important files and folders stored in other locations. The question is, do you know what files need to be kept safe? Chances are, not everything will be accessible from the documents folder alone. There's also programs, software licenses and a whole raft of other content that you probably won't want to lose. Disk imaging software ensures that you never forget a thing, since it automatically creates a complete, byte-by-byte image of all the data stored on any storage device. Although the backup might end up taking up significantly more space, that shouldn't present a problem given that modern drives have more capacity than many of us could ever use.

How Does Disk Imaging Software Work?

[email protected] Disk Image presents the ultimate data backup tool by copying every single one and zero on a storage device and making a byte-by-byte copy of all your data. Whether you're a home or business user, it's an excellent tool for making local backups of workstation computers and other devices. It works with solid-state drives, mechanical hard drives, external drives and even optical drives. To keep your backups as compact as possible, which is especially important if you plan to store them in the cloud, it allows you to choose a high compression level. Alternatively, if performance is your priority, you can choose low compression or avoid using compression at all. Furthermore, the software allows you to create disk images that only include occupied disk sectors - after all, there's not usually any point in backing up blank sectors. Nonetheless, if you prefer, [email protected] Disk Image also lets you create RAW disk images, which are identical in size to the original disk.

[email protected] Disk Image provides a wealth of other useful features, including full disk image encryption, automatic task scheduling and integrated support for Windows Storage Spaces. The latest version also improves GPT handling, offers faster compression and support for the latest version of ReFS. Find out more at

Download Now
Author: zdelete78Comments (0)
Category: Other

[email protected] Data Studio is a complete set of disk utilities for managing your hard drives and other storage devices. Providing you with everything you need to diagnose common problems, securely erase data, recover lost data and keep your files backed up, it functions as a fully self-contained operating environment. If you're stuck with a computer that won't boot, or you need to perform low-level tasks like data forensics or disk sanitation, this software suite provides everything you need. Since it works separately from anything installed on your computer, you can use it without any operating system installed, which also makes it invaluable for recovering lost or deleted system partitions or recovering from a severe malware attack or data breach. If you're trying to recover data, the self-contained operating environment also ensures that the original data won't be overwritten by the program.

Data Recovery Made Easy

Sometimes, you empty the recycle bin, delete a partition or format a storage device only to find out seconds too late that there was something important within. It's happened to most of us but, contrary to popular belief, the situation probably isn't nearly as serious as you might think. That's because, for some time after accidental deletion, data is actually fully recoverable. That's because the files remain hidden on the drive until something else overwrites them. Since the disk space is marked as available, that can happen at any time. However, the tools included with [email protected] Data Studio exploit this opportunity by searching for recoverable files and, in most cases, allowing you to retrieve them intact, particularly if you act quickly.

Protect Your Data with Secure Data Erasure

While it comes as a surprise to many that it's possible to recover deleted data, the consequence of this is also the fact that anyone else can obtain access to your deleted data on formatted partitions. If you're selling or donating your computer, that might present a serious security problem, particularly if your device contains sensitive information as most do. The tools provided with [email protected] Data Studio also allow you to securely erase data so that it will never be recovered simply by overwriting it in multiple passes to destroy the original data. Other security tools includes are the password-changing utility and a low-level disk editor that allows you to manually edit individual sectors on the disk.

Backup and Restore Included

As the ultimate set of disk utilities, [email protected] Data Studio also includes tools for automatically backing up and restoring your files by creating complete disk images that ensure nothing gets forgotten about. There's simply no better way to back up the entire contents of your computer, including all your documents, programs and even the operating system itself. Other tools for backup, diagnosis and troubleshooting include a BCD editor, boot disk creator and disk-monitoring tool. The latest version ships with all the most recent versions of Disk Image, File Recovery, Undelete, Partition Recovery and Password Changer. Furthermore, the boot disk has been upgraded to the latest version of WinPE to provide the most recent utilities and everyday apps, including a notepad, calculator, web browser and document viewer. Learn more at

Download Now
Author: livecdComments (0)
Category: Other

Elcomsoft Explorer for WhatsApp 2.40 adds the ability to access WhatsApp Business conversation histories from rooted Android handsets and Google Drive backups. For cloud acquisition from Google Drive, access to the user's Google Account and their verified phone number (SIM card) is required to obtain the encryption key and decrypt the backup. Physical extraction requires a rooted Android device running any version of Android from Android 4.0 through 8.1.

In addition, the new release supports the new Google Drive authentication method implemented by WhatsApp and WhatsApp Business. Elcomsoft Explorer for WhatsApp enables access to WhatsApp and WhatsApp Business Google Drive backups without requiring to enter the phone number.

Exclusively available to Android users, WhatsApp Business is a new app offering a number of features aimed at small business owners. The free Android app allows businesses interact with their customers by using a number of automation tools to quickly find and respond to messages. At this time, WhatsApp Business has more than 10 million installations according to Google Play Store statistics.

Elcomsoft Explorer for WhatsApp 2.40 can now extract information from the new WhatsApp Business app in addition to regular WhatsApp. Two acquisition methods are supported: physical extraction from rooted Android devices as well as cloud extraction from Google Drive. Extracting from Google Drive requires Google Account credentials (login and password, as well as access to the secondary authentication factor, if 2FA is enabled). In addition, the cloud extraction tool registers itself as a new WhatsApp recipient, requiring access to the user's registered SIM card or phone number.

At this time, Elcomsoft Explorer for WhatsApp 2.40 supports the following WhatsApp Business acquisition methods:

  • Downloading and decrypting WhatsApp Business backups from Google Drive

  • Extracting WhatsApp Business databases from a rooted Android device (all versions of Android that support WhatsApp Business; root access required)

Find more information about Elcomsoft Explorer for WhatsApp and download free trial version at

Download Now
Author: hgfhmertdvComments (0)
Category: Other

Apple has a wonderfully integrated ecosystem. It conveniently synchronizes information such as passwords, Web browsing history, contacts and call logs across all of the user's devices. This mechanism uses iCloud to sync and store information. It works independently from iOS system backups that are also stored in iCloud or iCloud Drive. As opposed to daily iCloud backups, synced data is updated and propagated across devices in almost real time. Extracting this data can be invaluable for investigations as it provides access to the most up to date information about the user, their activities and whereabouts.

What exactly is synced through iCloud?

- Photos (iCloud Photo Library)

- Mail (iCloud mail only)

- Contacts, Calendars, Reminders

- Safari (browsing history, bookmarks, tabs open on other devices)

- Game Center (profiles, achievements, game progress)

- Siri (requests, settings)

- Keychain (iCloud Keychain stores passwords and forms from Safari, iOS system, Apple, some third-party apps, but not Google Chrome)

- iCloud backups (up to last 3 copies per device, created daily while charging)

- iBooks, Pages, Numbers, Keynote

- Maps

- Wallet

- Wi-Fi

While this data is or can be synced with iCloud, there is really no way to view, download or otherwise access most of that data other than by syncing it to an Apple device. This is why we made Elcomsoft Phone Breaker. With time, we were adding support for more and more categories. iCloud Keychain was particularly tricky as it features an advanced protection mechanism; we were able to work around it just months ago. iCloud Photo Library was another highlight. We discovered that Apple didn't actually remove photos users deleted from their library. We were also the first to extract call logs, which, despite the lack of a dedicated option in iCloud settings, are still synced with other device with no obvious way to disable the (quite controversial, according to many users) feature.

Elcomsoft Phone Breaker 8.20 adds the following categories to the list of extractable ones:

- Account/User info

- Wi-Fi

- Apple Maps

- Wallet (except credit card data)

- iBooks

What's so interesting about the newly added categories? In many cases, there's more to them than meets the eye.

Account/User info includes comprehensive information about the owner of the Apple Account including their phone numbers and street address. In addition, here you'll find the list of the user's devices including their serial numbers and OS versions. As a bonus, you'll often find information about devices that used to be registered on the user's account (but not anymore).

iBooks: why would you want to read somebody else's books? The thing is, it's not about the books at all. The new category includes documents that were opened or manually added by the user. Since iBooks can handle PDF files, many iOS users won't bother installing a third-party PDF reader such as Adobe Acrobat. By downloading the "iBooks" category, you can gain access to PDF files, e-books and documents the user opened with the iBooks app.

Wi-Fi information includes wireless access point names and MAC addresses. This data cannot be removed from the device without doing a hard reset. By tracing down the location of those MAC addresses, it becomes possible to determine the user's whereabouts at the time the access point was added.

Wallet may contain a lot of essential evidence including air tickets, hotel bookings and car rentals with full information, boarding passes, bonus programs, club cards, movie and railway tickets, and so on and so forth.

Last but not least, Apple Maps is probably the most undervalued category. It's common belief that Google is the evil one, collecting excessive information about the user and tracking their every step, while Apple is privacy-minded and does't track its customers. Well, think again: Apple Maps deliver just as much data about the iPhone user as would be available for an Android user in their Google Account. While Google allows its users to see exactly what the company knows about them and fully or selectively delete any of that data, Apple keeps things in secret. Want to access your location history? Google users can navigate to their Timeline and instantly see what Google knows about their location. iPhone users don't have such luxury. The only way to access historic geolocation data would be using Elcomsoft Phone Breaker and download "Apple Maps", then viewing the data in Elcomsoft Phone Viewer. Routes, places, favorites and searches are available.

This time, we didn't "break" or "hack" anything. You still need the user's iCloud/Apple ID authentication credentials to access iCloud data, be it the login/password or an authentication token extracted from the user's computer.
Download Now
Author: elcomviewerComments (0)