Exploring Two-Factor Authentication

In this article we’ll discuss the differences between implementations of two-factor authentication in popular mobile platforms. We’ll research how two-factor authentication is implemented in Android, iOS and Windows 10 Mobile, and discuss usability and security implications of each implementation.What Read more

Mobile Forensics: Not for Dummies

ElcomSoft Co. Ltd. has published Mobile Forensics – Advanced Investigative Strategies by Oleg Afonin and Vladimir Katalov. The 7-1/2″ x 9-1/4″ paperback offers 380 pages of insight and knowledge accumulated by ElcomSoft researchers throughout the years. Amazon Kindle Edition as … Read more