top of page

BLOG
Your source for insights from our team on secure communications and encryption,
with tips and tricks to get the most from using Cellcrypt


CELLCRYPT
Feb 8
Dirtboxes - Securing Communications Against Fake Cellular Towers
In recent months, alarming news has emerged from Australia, where criminals have been using inexpensive, easily deployable devices known...
14 views


CELLCRYPT
Dec 11, 2024
The Hidden Risks of Relying on Email for Sending Sensitive or Important Documents
Email is at the heart of modern business, enabling everything from routine status updates to high-stakes contract negotiations. It’s so...
51 views


CELLCRYPT
Dec 6, 2024
From the Frying Pan to the Fire: Why Consumer 'Secure' Messaging Apps Are NOT the Solution in a Post-Salt Typhoon World
The Salt Typhoon cyberattacks represent a pivotal moment for organizations in critical infrastructure, enterprise, and government...
57 views


CELLCRYPT
Nov 8, 2024
Salt Typhoon Underscores the Need for Encrypted Calls with Post-Quantum Cryptography.
Importance of Security in Communication In recent months, a hacking group known as "Salt Typhoon" has infiltrated several U.S. internet...
113 views
bottom of page