• Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
HackRead
  • March 3rd, 2021
  • Home
  • Advertise
  • Privacy Policy
  • Contact Us
HackRead
  • Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
  • Follow us
    • Facebook
    • Twitter
    • Linkedin
    • Youtube
Home
Surveillance
NSA

Leaked info confirms in-house hacking capabilities of Israeli firm Cellebrite

December 27th, 2016 Ryan Bingham Hacking News, NSA, Privacy, Security, Surveillance 0 comments
Leaked info confirms in-house hacking capabilities of Israeli firm Cellebrite
Share on FacebookShare on Twitter

Most iPhone users assume a certain level of security regarding the data on their device. However, a recent report from ZDNet detailing the capabilities of well-known Israeli Digital Forensics Firm; Cellebrite; has revealed that this very well may not be the case.

iPhone and iOS, security appears to be largely contingent upon the model of the phone itself and the version of iOS running. Cellebrite’s sophisticated software can easily obtain unencrypted data stored on a device, including deleted data. This new report reveals the extent of information an iPhone can give out when appropriately hacked.

Also Read: This is how hacked Israeli drone feeds look like

Cellebrite is a Digital Forensics Firm firm that specializes in hacking smartphones including the iPhone. Launched into the spotlight earlier this year during the San Bernardino iPhone standoff between Apple and the FBI; they were touted as the company that could crack the handset. Cellebrite reports that they did not help the FBI, but has now assured the community it certainly has the capabilities of cracking the iPhone or any other smartphone.

ZDNet’s inspection of leaked files received earlier this year, ostensibly belonging to an unnamed US Police department; showcases the depth of Cellebrite’s phone hacking software. The leak, which was part of a series of large encrypted files ZDNet received earlier this year as a “…result of a leak at a law firm,” which synchronized its backup systems over the internet without a password.

Included in the leak were a series of phone dumps created by the police using Cellebrite technology.

Cellebrite states it can download almost everything from just about any device in a matter of seconds. Able to produce a report, in minutes; that details messages, phone calls, voicemails, images, locations, and timestamps.

Data extracted from an iPhone 5 / Source: ZDNet

Leaked location file shows how the firm can track victim’s location / Source: ZDNet

Read: Israeli Tech firm claims CatchApp can hack any WhatsApp account

If the phone in question is not password protected; the data can include deleted data and activity analytics features that describe how many actions have taken place on the device, such as making calls or sending texts.

Cellebrite claims as of yet can’t hack passcodes on the iPhone 4s or later.

With the release of password encryption in iOS 8; coupled with a secure enclave co-processor in the iPhone; Apple is going a long way towards making phone-hacking even harder in the future.

[fullsquaread][/fullsquaread]

For more pics and in-depth detail visit ZDNet.

DDoS attacks are increasing, calculate the cost and probability of a DDoS attack on your business with this DDoS Downtime Cost Calculator.

Did you enjoy reading this article? Kindly do like our page on Facebook, follow us on Twitter and Google + and help us grow.

  • Tags
  • Apple
  • hacking
  • internet
  • iPhone
  • Israel
  • Privacy
  • security
  • Smartphone
  • Surveillance
Facebook Twitter LinkedIn Pinterest
Previous article Thai Police Arrest 9 Suspects Behind Cyber Attacks on Gov't Sites
Next article Sultry Sextortion Sisters Meet Their Match In Nigerian Oil Billionaire
Ryan Bingham

Ryan Bingham

Related Posts
Gootloader exploits websites via SEO to spread ransomware, trojans

Gootloader exploits websites via SEO to spread ransomware, trojans

Authentication bypass vulnerability found in NATO, EU approved firewall

Authentication bypass vulnerability found in NATO, EU approved firewall

Data analytics firm Polecat data breach - 30TB of data exposed

Data analytics firm Polecat data breach - 30TB of data exposed

Newsletter

Get the best stories straight into your inbox!



Don’t worry, we don’t spam

Latest Posts
Gootloader exploits websites via SEO to spread ransomware, trojans
Security

Gootloader exploits websites via SEO to spread ransomware, trojans

Authentication bypass vulnerability found in NATO, EU approved firewall
Security

Authentication bypass vulnerability found in NATO, EU approved firewall

Data analytics firm Polecat data breach - 30TB of data exposed
Leaks

Data analytics firm Polecat data breach - 30TB of data exposed

HACKREAD is a News Platform that centers on InfoSec, Cyber Crime, Privacy, Surveillance and Hacking News with full-scale reviews on Social Media Platforms & Technology trends. Founded in 2011, HackRead is based in the United Kingdom.

Follow us