
COVID-bit
The wireless spyware trick with an unfortunate name If you’re our regular reader, you can probably guess where on the planet we’re headed in this
The wireless spyware trick with an unfortunate name If you’re our regular reader, you can probably guess where on the planet we’re headed in this
All info below are coming from XCell Technologies management team, and also from public sources. We have discovered a new kind of scam/fraud and the
We now accept cryptocurrencies as a payment option. “Cryptocurrency” is a form of digital currency that allows you to send and receive money anywhere in
Digital-defence reportBelarus, Russia, Chechen Republic, Dagestan, Iran, Vietnam, Jordan, China, Saudi Arabia, North Korea, Brunei, Burkina Faso, Cuba, Eritrea, Guinea, Laos, Libya, Mali, Myanmar, Oman,
The first 4G Stealth Phone Attacking and disabling a GSM Interceptor / IMSI Catcher over the air by using a special StealthPhone has became reality
does it really protect your privacy? “If encryption made a difference, they wouldn’t allow us to use it,” someone said. Encrypted calls protect you from
VPN software flaw Remember our warnings regarding VPN use and security flaws that all VPNs have? Now this: FBI warning: This zero-day VPN software flaw
The download is actually a Trojan – so stay away! Cisco Talos detects an early-stage campaign targeting low-information users. A malware vendor has created a
Which data is stored? Almost one year ago we have removed Proton Mail and Wire smartphone apps from XStealth and XStealth Lite. At that time
how people move during coronavirus pandemic. A man checks his phone in Times Square. Cell phone data used by the government shows which public spaces
The wireless spyware trick with an unfortunate name If you’re our regular reader, you can probably guess where on the planet we’re headed in this
All info below are coming from XCell Technologies management team, and also from public sources. We have discovered a new kind of scam/fraud and the
We now accept cryptocurrencies as a payment option. “Cryptocurrency” is a form of digital currency that allows you to send and receive money anywhere in
Digital-defence reportBelarus, Russia, Chechen Republic, Dagestan, Iran, Vietnam, Jordan, China, Saudi Arabia, North Korea, Brunei, Burkina Faso, Cuba, Eritrea, Guinea, Laos, Libya, Mali, Myanmar, Oman,
VPN software flaw Remember our warnings regarding VPN use and security flaws that all VPNs have? Now this: FBI warning: This zero-day VPN software flaw
The download is actually a Trojan – so stay away! Cisco Talos detects an early-stage campaign targeting low-information users. A malware vendor has created a
Which data is stored? Almost one year ago we have removed Proton Mail and Wire smartphone apps from XStealth and XStealth Lite. At that time
how people move during coronavirus pandemic. A man checks his phone in Times Square. Cell phone data used by the government shows which public spaces
No need to panic. This is not a case of secret nation-state methods of phone tapping (or espionage, as it is often called). It’s not
New attack allows hackers to decrypt VoLTE encryption to spy on phone calls. A team of academic researchers – who made headlines earlier this year
The wireless spyware trick with an unfortunate name If you’re our regular reader, you can probably guess where on the planet we’re headed in this
All info below are coming from XCell Technologies management team, and also from public sources. We have discovered a new kind of scam/fraud and the
does it really protect your privacy? “If encryption made a difference, they wouldn’t allow us to use it,” someone said. Encrypted calls protect you from
PEGASUS -Tactical WIFI Interception Since 2015, when Google released the latest version of AOSP, Android-5.1.1_r5, and in it you can find the code to support
emystify degoogled android phones. Yes, we know: Google does mass surveillance. Yes, we know: Google’s Sensorvault is the real Big Daddy. Yes, we know: This
What’s behind it? Untrackable phones refer to the phone’s ability to hide its real geo-location by showing its location in a different place than where
If you can’t convince them, confuse them. This is the basis for selling lies. And very easy for anonymous SIM card fraud. Preparatory measures Without
How network operators must comply with wiretapping law Surprisingly, the phone number (which is called MSISDN in terms of mobile networks) is not stored on
New attack allows hackers to decrypt VoLTE encryption to spy on phone calls. A team of academic researchers – who made headlines earlier this year
does it really protect you? At first glance, it looks like voice switching can be easily implemented on a cell phone, but real-time voice switching
The first 4G Stealth Phone Attacking and disabling a GSM Interceptor / IMSI Catcher over the air by using a special StealthPhone has became reality