The NVIDIA GPU release cycle is about two years: the RTX 2080 Ti was announced back in August 2018, with 4,352 CUDA cores, 1.2 times more cores than the previous generation GTX 1080 Ti, and it has exactly twice the … Read more
Memory analysis is an essential method of electronic evidence discovery. It allows computer forensics to decrypt hard disks and files and extract encryption keys and passwords.
We are proud to introduce Passware Bootable Memory Imager – a new UEFI compatible … Read more
The Microsoft Windows operating system stores passwords and other login data for the installed applications on a system disk in the user profile directory, as well as in a hierarchical Windows registry database. By acquiring this database from a target … Read more
The brute-force approach is the most time-consuming password recovery method. We are proud to share that we have introduced Mask attack that significantly reduces the time spent on password recovery by skipping unnecessary character combinations.
The new version of Passware … Read more
VeraCrypt and TrueCrypt continue to be two of the most complex types of encryption to bypass. Both tools provide an option to use keyfiles for encrypting volumes. The content of the keyfile (or multiple keyfiles) is combined with the password, … Read more
Apple takes privacy, security, and encryption very seriously. While the latest improvements in macOS and iOS security help users to keep their data safe, they also create additional challenges for forensic examiners.
All the latest Apple computers are protected with … Read more
Passware Kit 2020 v1 introduces a built-in Dictionary Manager, support for VeraCrypt GPT system encryption, and optimized decryption process for hard drives.
The new version also extracts passwords from Windows 10/8 standalone systems protected with Windows Hello: PIN and Picture … Read more
The Passware team has analyzed over 4 billion real user passwords and gathered data on the latest trends on password use.
ABOUT THE RESEARCH
As sources of passwords, we have merged leaked passwords databases available over the internet, passwords recovered … Read more
- Instant decryption of Symantec Endpoint Encryption disks via live memory analysis
- Support for additional VeraCrypt encryption algorithms
- Optimized password recovery for TrueCrypt/VeraCrypt
- Support for EnCase EX01 image files format
- Export and import of dictionaries
- Saving MS Office encryption