Feeds

Kit cracks iPhone backup passwords

Download, point, click

Business security measures using SSL

Password cracking of iPhone backups has become a point-and-click exercise thanks to software unveiled Thursday by a computer forensics tools provider.

The Elcomsoft iPhone Password Breaker, which was released for free into beta, recovers passwords for iPhones and iPod Touches by trying thousands of phrases per second. It performs wordlist-based attacks only, but the final version will allow dictionary attacks that can be customized.

Apple's iTunes application allows users to make iPhone and iPod Touch backups that store a wealth of potentially sensitive information, including call logs, address books, SMS archives, calendars, pictures and voice mail. Brought to you by the same company that offers password crackers for wireless networks, Quicken files and many other applications, the iPhone Password Breaker doesn't require the use of iTunes.

It makes use of multi-core processors, extended CPU instructions and will run faster on certain types of graphics cards. It runs on the XP, Vista and 7 versions of Windows. Help Net Security has screenshots here. ®

Secure remote control for conventional and virtual desktops

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.