Blog

EXPOSED

All info below are coming from XCell Technologies management team, and also from public sources. We have discovered a new kind of scam/fraud and the

Read More »

Pay with cryptocurrency

We now accept cryptocurrencies as a payment option. “Cryptocurrency” is a form of digital currency that allows you to send and receive money anywhere in

Read More »

State-sponsored cyber attacks

Digital-defence reportBelarus, Russia, Chechen Republic, Dagestan, Iran, Vietnam, Jordan, China, Saudi Arabia, North Korea, Brunei, Burkina Faso, Cuba, Eritrea, Guinea, Laos, Libya, Mali, Myanmar, Oman,

Read More »

X-ONE Stealth Phone

The first 4G Stealth Phone Attacking and disabling a GSM Interceptor / IMSI Catcher over the air by using a special StealthPhone has became reality

Read More »

Voice call encryption

does it really protect your privacy? “If encryption made a difference, they wouldn’t allow us to use it,” someone said. Encrypted calls protect you from

Read More »

FBI warning

VPN software flaw Remember our warnings regarding VPN use and security flaws that all VPNs have? Now this: FBI warning: This zero-day VPN software flaw

Read More »

Anti-NSO Pegasus Spyware

The download is actually a Trojan – so stay away! Cisco Talos detects an early-stage campaign targeting low-information users. A malware vendor has created a

Read More »

U.S. government tracks

how people move during coronavirus pandemic. A man checks his phone in Times Square. Cell phone data used by the government shows which public spaces

Read More »

EXPOSED

All info below are coming from XCell Technologies management team, and also from public sources. We have discovered a new kind of scam/fraud and the

Read More »

Pay with cryptocurrency

We now accept cryptocurrencies as a payment option. “Cryptocurrency” is a form of digital currency that allows you to send and receive money anywhere in

Read More »

State-sponsored cyber attacks

Digital-defence reportBelarus, Russia, Chechen Republic, Dagestan, Iran, Vietnam, Jordan, China, Saudi Arabia, North Korea, Brunei, Burkina Faso, Cuba, Eritrea, Guinea, Laos, Libya, Mali, Myanmar, Oman,

Read More »

FBI warning

VPN software flaw Remember our warnings regarding VPN use and security flaws that all VPNs have? Now this: FBI warning: This zero-day VPN software flaw

Read More »

Anti-NSO Pegasus Spyware

The download is actually a Trojan – so stay away! Cisco Talos detects an early-stage campaign targeting low-information users. A malware vendor has created a

Read More »

U.S. government tracks

how people move during coronavirus pandemic. A man checks his phone in Times Square. Cell phone data used by the government shows which public spaces

Read More »

REVOLTE ATTACK

New attack allows hackers to decrypt VoLTE encryption to spy on phone calls. A team of academic researchers – who made headlines earlier this year

Read More »

EXPOSED

All info below are coming from XCell Technologies management team, and also from public sources. We have discovered a new kind of scam/fraud and the

Read More »

Voice call encryption

does it really protect your privacy? “If encryption made a difference, they wouldn’t allow us to use it,” someone said. Encrypted calls protect you from

Read More »

DeGoogled Android

emystify degoogled android phones. Yes, we know: Google does mass surveillance. Yes, we know: Google’s Sensorvault is the real Big Daddy. Yes, we know: This

Read More »

REVOLTE ATTACK

New attack allows hackers to decrypt VoLTE encryption to spy on phone calls. A team of academic researchers – who made headlines earlier this year

Read More »

Voice changer

does it really protect you? At first glance, it looks like voice switching can be easily implemented on a cell phone, but real-time voice switching

Read More »

secure cell phone?

Seriously? Test your “safe” phone. Now. Let’s face it, who are you really afraid of? There aren’t that many hackers who can actually track your

Read More »

X-ONE Stealth Phone

The first 4G Stealth Phone Attacking and disabling a GSM Interceptor / IMSI Catcher over the air by using a special StealthPhone has became reality

Read More »