Latest articles

Cell Tower Lock

Cell Tower Lock

Mobile surveillance is a rising threat. The Cell Tower Lock feature from XCell Stealth Phones adds a vital layer of protection by locking your device to a trusted cell tower, blocking fake base stations like IMSI catchers and GSM interceptors.

Read More »

XStealth PRO and ULTRA: Official Launch​

XCell Technologies unveils the XStealth PRO and ULTRA next-generation Android Stealth Phones engineered to counter mobile surveillance threats. With features like voice call encryption, IMSI/IMEI change, and advanced interception alerts, these devices offer unparalleled security and privacy for professionals and privacy-conscious users alike.

Read More »
COVID-bit

COVID-bit attack

This article takes us to the Department of Software and Information Systems Engineering at Ben-Gurion University of the Negev in Israel, which has found problems with so-called airgapped networks.

Read More »
ABC Limited exposed

Secure WIFI router scam

There will always be fraudsters who take advantage of the desire for security by overpricing normal products and claiming that these have “security features”. As in this case… Read more

Read More »

Anti-NSO Pegasus Spyware

A malware vendor has set up a fake website claiming to be from Amnesty International, offering gullible users software that purports to protect them from the NSO Group’s Pegasus malware. In reality it is a Remote Access Trojan (RAT).

Read More »
A smartphone using Protonmail

Attention Proton-Mail users!

We have to remind you of our approach when it comes to encryption: it is for average people to use and will only defend you against (some) hackers. It will not protect you at all against law enforcement, as you will read in this article.

Read More »
Unknown man using his cell phone and is looking into a camera on the street

U.S. government tracks

Government officials in the US are using location data from millions of mobile phones to better understand the movements of Americans during the coronavirus pandemic and its potential impact on the spread of the disease.

Read More »
Google Smartphone

DeGoogled Android​

We know you all want to get rid of Google apps on your Android smartphone. But can you really get rid of them? And is it really good for your privacy and security? We don’t think so. Read more

Read More »
REVOLTE ATTACK

Revolte attack

This attack allows an attacker to break the encryption of VoLTE voice calls and spy on the calls being targeted. Read the full article

Read More »
phone number spoofing

Phone number spoofing

What is the point of changing your phone number and, more importantly, what protection does it give you? Is this the right way to protect yourself? Read this article

Read More »