Top Stories

_____________________________________________

 

http://img19.imageshack.us/img19/7261/mzlvszcpxfs175x17575.jpg

Fat Jump Pro (By SID On)

Developer: SID On Price: $0.99 Version Reviewed: 1.2 Download: here Requirements: Compatible with iPhone, iPod touch, and iPad.Requires iOS 4.0 or later. Located in the Warsow,Poland-SID on an independent mobile application developer has announced a recent update of Fat Jump Pro for the iPhone,iPad and iPod touch.Fat Jump Pro is a fast paced vertical arcade action for the iOS devices.Using the tilt controls the player must guide the jumping,little green hero (a healthy and crispy cucumber) up a never ending series of platforms...

https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEheOZX_2fWULSTc9cCEPViLz6CGJ0M-A3PeJDmVhpJSA02I84Z1gef0cif5bu640uxtj9uzh47wf80tpw9as6jGYUVC9hq8orbuI9gZB15pmPjzrI5OgvQquFCHNGUWn2gIEZzzu2HvNJQ/s1600/hello.png  Detectives’ Chase
http://img.148apps.com/images/itms/471/471857988/icon175x175.png  Ticket to Ride Pocket
http://img.148apps.com/images/itms/441/441083639/icon175x175.png  NFL Pro 2012
http://img.148apps.com/images/itms/466/466067444/icon175x175.png  Blood and Glory

 

Latest Stories

______________________________________________

Friday 3 February 2012

Apple FileVault 2 encryption cracked by forensic software

The encryption keys for Apple’s FileVault 2 full-disk encryption used with OS X Lion can be recovered “in minutes” from memory, password-cracking outfit Passware has announced.
The latest version of the company’s Passware Kit Forensic, v11.4, could extract the keys using a ‘live memory acquisition’ technique that sucked out a memory image via FireWire for analysis.
When the company says “minutes,” it means around 40 minutes on average, but success was still possible regardless of the length or complexity of the password used, Passware said.
The announcement builds on the same product’s ability to recover Apple OS X logins in addition to those of Microsoft’s BitLocker encryption and the open source tool TrueCrypt.
The technique requires certain conditions to work, starting with the computer being turned on and logged in; the FileVault, BitLocker or TrueCrypt keys have to be in memory for Passware Kit Forensic to be able to extract them.
Put another way, the product cannot extract encryption keys on static data or before the keys have been summoned as part of the logging-in process. As long as the login is not automatic users should be safe.
In the case of FireVault, hackers also need to get to the memory contents through a working FireWire port so remote access is not possible.
“Live memory analysis opens up great possibilities to password recovery and decryption. Every user should be aware that even full disk encryption is insecure while the data rests in computer memory,” said Passware’s president, Dmitry Sumin, who believed the product would appeal to forensic specialists looking for a way past encryption.
Passware Kit Forensic costs $995, including one year of updates. 
Via:Macworld

0 Responses to “Apple FileVault 2 encryption cracked by forensic software”

Post a Comment