Approaching iOS Extractions: Choosing the Right Acquisition Method

Originally published by Elcomsoft. The extraction method or methods available for a particular iOS device depend on the device’s hardware platform and the installed version of iOS. While logical acquisition is available for all iOS and iPadOS devices, more advanced extraction methods are available for older platforms and versions of iOS. But what if more than one way to extract the data is available for a given device? In this guide, we’ll discuss the applicable acquisition methods as well as the order in which they should be used.

New Release: install4j v.10.0

This release adds: Support for Windows on ARM Support for Apple App Store submission “Add a Windows firewall rule” action Undo/Redo functionality for all modifications in the install4j IDE Support for default values for bean properties with a gutter marker for non-default values and a context menu action to reset the default value Static configuration […]

New Release: JProfiler v.13.0

This release adds: Support for Windows on ARM Support for Apple App Store submission “Add a Windows firewall rule” action Undo/Redo functionality for all modifications in the install4j IDE Support for default values for bean properties with a gutter marker for non-default values and a context menu action to reset the default value Static configuration […]

Keeping your Remote Workers (digitally) Secure

With remote working now recommended or mandated by governments across the globe due to COVID-19, many companies are suddenly being faced with setting up telecommuting infrastructure within their organizations. Unfortunately, by rushing setup or by asking employees to make their own arrangements, security concerns could become rampant. Not only can some software leave a computer […]

Space Code Reviews in IntelliJ IDEA 2021.1

JetBrains’ Space makes it easy for you and your team to review code, and discuss changes. You can request a review from one or more team members after the changes. When working on a feature branch, you can merge it back into the base branch, right from Space. Code reviews and merge requests can be […]

Introducing the IntelliJ IDEA Guide

The IntelliJ IDEA Guide has 50+ tips, and some tutorials, which are all organised by technology and topic. The Guide is made for the community, so we intend it to be an open-source project. It’s in GitHub, and has a Markdown-based contribution format. We also have Guides from other products, both deployed and on the […]

[Update] AdminStudio 2021 Now Released!

Flexera has just announced the new release of AdminStudio 2021! With the new release, you can easily integrate into your existing package request workflows. While this may traditionally involve a simple service desk ticket, in the modern era of interconnectivity, it’s important to make technology work together simply and seamlessly—in this case, through a documented […]

Why Security Monitoring?

Security monitoring is beginning to change in the field of Information Technology. Companies can now see more about the activity on their networks than they ever have before. Here at Holm Security we do not only monitor, but give our customers comprehensive reports on risk factors as well as providing solutions to the problems that […]

5 Steps to Successful Vulnerability Management

Vulnerability Management is a cornerstone in a modern cyber security defense. But getting started and implementing a successful security strategy for Vulnerability Management can be challenging. Here is our checklist to help you become successful.