Latest articles

XStealth Pro in progress image

New added special features

There’s a golden ticket for our users, and a backstage pass for our resellers that we’re sending to you so you can dive back into epic insights of the XStealth project.

COVID-bit

COVID-bit attack

This article takes us to the Department of Software and Information Systems Engineering at Ben-Gurion University of the Negev in Israel, which has found problems with so-called airgapped networks.

blank

Pay with cryptocurrencys

Prefer to pay in cryptocurrency? We’ve got good news for you. You can easily pay by crypto and we will ship your Stealth Phone to you.

ABC Limited exposed

Secure WIFI router scam

There will always be fraudsters who take advantage of the desire for security by overpricing normal products and claiming that these have “security features”. As in this case… Read more

A man using his cell phone and attacking an IMSI Catcher

X-ONE Stealth Phone

The first 4G stealth phone with an unprecedented feature: XTerminator which allow OTA attacks against IMSI Catchers. Read more

A Smartphone running malicious code

FBI warning: VPN software flaw

Remember our warnings regarding VPN use and security flaws that all VPNs have? Now this: FBI warning: This zero-day VPN software flaw was exploited by APT hackers.

blank

Anti-NSO Pegasus Spyware

A malware vendor has set up a fake website claiming to be from Amnesty International, offering gullible users software that purports to protect them from the NSO Group’s Pegasus malware. In reality it is a Remote Access Trojan (RAT).

A smartphone using Protonmail

Attention Proton-Mail users!

We have to remind you of our approach when it comes to encryption: it is for average people to use and will only defend you against (some) hackers. It will not protect you at all against law enforcement, as you will read in this article.

Unknown man using his cell phone and is looking into a camera on the street

U.S. government tracks

Government officials in the US are using location data from millions of mobile phones to better understand the movements of Americans during the coronavirus pandemic and its potential impact on the spread of the disease.

How confidential are your calls

How confidential are your calls?​

This case, discovered by Indian cybersecurity researcher Anand Prakash, was just a bug of bad programming, and is euphemistically called IDOR, short for Insecure Direct Object Reference.

Google Smartphone

DeGoogled Android​

We know you all want to get rid of Google apps on your Android smartphone. But can you really get rid of them? And is it really good for your privacy and security? We don’t think so. Read more

blank

Cell phones that can’t be tracked?

The ability to hide your current location by showing your location elsewhere. Learn the difference between the real thing and unnecessary VPN apps. Find out more

Anonymous SIM Scams

Beware Anonymous SIM Scams

Protected SIM cards? Empty promises of benefits that are in fact useless and do not protect you from interception. Read the full article

REVOLTE ATTACK

Revolte attack

This attack allows an attacker to break the encryption of VoLTE voice calls and spy on the calls being targeted. Read the full article

phone number spoofing

Phone number spoofing

What is the point of changing your phone number and, more importantly, what protection does it give you? Is this the right way to protect yourself? Read this article

blank

Untraceable cell phones?

Have you got an untraceable phone? We’ll help you test it! Do you really want to protect yourself? Read this article

blank

When encryption is not enough

There are times when you need to be able to use a mobile phone without anyone intercepting your calls and texts, including government agencies.