Tweets from December 2014

RT @csoghoian: New counter-surveillance tool, SnoopSnitch, released by Karsten and team at #31c3 today. https://t.co/7jDDW2Ffst

7:29pm December 28th 2014 via Falcon Pro

RT @ajinabraham: How secure is your favourite Android Browser? Report => http://t.co/09ppZPgtW0 #android CC: @AndroidTamer @droidsec http://t.co/tYsZI3Aihz

6:14am December 26th 2014 via Falcon Pro

RT @AndroidTamer: Java's SSLSocket : How Bad APIs Compromise Security Tale of a Frustrated Android Developer (PDF) : https://t.co/mWlPHAv1pZ

6:11am December 26th 2014 via Falcon Pro

RT @Gunther_AR: Android encryption screen escape technique -released during AHA http://t.co/8zp8iSOxjw

6:10am December 26th 2014 via Falcon Pro

RT @kapitanpetko: Dissecting Lollipop's Smart Lock http://t.co/W7PwaDp7om

5:51pm December 24th 2014 via Falcon Pro

RT @AndreaBarisani: we will be giving an ARM TrustZone dojo at CanSecWest, training platform is the USB armory, students get to keep one https://t.co/UBjRnSZ88o

5:51pm December 24th 2014 via Falcon Pro

RT @timstrazz: Ugh - foresee a pull request in dexlib2's future thanks to @caleb_fenton making me look at it... https://t.co/nA1BMEtHMZ

5:46pm December 24th 2014 via Falcon Pro

@timstrazz hahaha awesome shirt :D ⬇↘➡👊

6:36pm December 23rd 2014 via Falcon Pro in reply to timstrazz

RT @FightCade: Our provider @linode has just notified us that FightCade server is under Denial of Service attack... http://t.co/dkLIXQSPBk

11:38pm December 21st 2014 via Twitter Web Client

RT @TeamAndIRC: Only public explanation ive seen of how WeakSauce 1 works http://t.co/cC2KqUX1gc - WeakSauce 2 works in a very similar way

7:56am December 21st 2014 via Falcon Pro

RT @NowSecureMobile: Over 200 Android apps, downloaded over 100 million times, vulnerable to ad library vulnerability cc @Fuzion24: https://t.co/B3Y4unJjqO

7:53am December 21st 2014 via Falcon Pro

RT @quequero: Android CoolReaper backdoor samples: http://t.co/k5bhfIZsGK

7:52am December 21st 2014 via Falcon Pro

RT @zeewox: New blog post: [QPSIIR-80] #Qualcomm #TrustZone Integer Signedness bug http://t.co/WdM4rRvmvZ #android #security #advisory

7:51am December 21st 2014 via Falcon Pro

RT @AndroidPolice: Coolpad's Android Devices Have Factory-Installed Backdoor That Impersonates Google Play Services Framework, Says… http://t.co/eorJcmlL8Q

7:49am December 21st 2014 via Falcon Pro

#include <stdio.h> #include <unistd.h> int main(){ pid_t pid=fork(); if(pid==0) printf("Lia\n"); if(pid>0) printf("@pof\n"); return 0; }

4:47am December 16th 2014 via Falcon Pro

@deese i use a real device.... but if you have to use an emulator, genymotion is faster

11:55pm December 15th 2014 via Falcon Pro in reply to deese

RT @FightCade: This is what happens when GGPO is down on Sunday... +300 people connected to FightCade! - http://t.co/Df76OFV5S0 http://t.co/M3DS0KHirm

9:09pm December 14th 2014 via Falcon Pro

RT @Kyle27_: Brute-force attack easily decodes Android phone, Samsung smartwatch data exchange http://t.co/3AP1nGcLxx via @LiviuArsene @Bitdefender

9:19am December 14th 2014 via Falcon Pro

RT @metall0id: Just dropped the Samsung Knox smdm:// exploit from @quarkslab into drozer develop branch. ph33r! https://t.co/GZImP8ZV9f.

9:18am December 14th 2014 via Falcon Pro

RT @virqdroid: Android Security (and Not) Internals - http://t.co/nSgvBuq1xY (Ebook) via @zyrikby

9:18am December 14th 2014 via Falcon Pro

RT @Gunther_AR: APK签名校验绕过 - http://t.co/oiVmSX46RK (Bypass Android Signature Verification)

9:17am December 14th 2014 via Falcon Pro

RT @Gunther_AR: ManifestAmbiguity - Parser & Modify AndroidManifest.xml to prevent APK from re-package https://t.co/vMrv5W74pl CC: @timstrazz @caleb_fenton

9:17am December 14th 2014 via Falcon Pro

RT @jebdec: Decompiled Android malware for #RedOctober #CloudAtlas #APT , have a look for yourself! http://t.co/WrRgTSO7OY #JEB

9:14am December 14th 2014 via Falcon Pro

RT @virqdroid: Android Content Provider Security - http://t.co/QvQAxMreDr (in Chinese)

9:11am December 14th 2014 via Falcon Pro

RT @virqdroid: FSquaDRA - Tool for detection of repackaged Android applications - https://t.co/qNv47IWXrg (via @zyrikby )

9:11am December 14th 2014 via Falcon Pro

RT @maldr0id: Cross-signed certificates crash every version of #Android: http://t.co/qXSxZ9lYq0

8:49am December 13th 2014 via Falcon Pro

RT @kutyacica: CVE-2014-4323 improper input validation in MDP driver https://t.co/RD4FZjYlky discovery: Gal Beniamini. Impact: limited chipset family range

8:44am December 13th 2014 via Falcon Pro

RT @AndroidDev: Hello World, meet our new experimental toolchain, Jack and Jill http://t.co/XFCEbiuKDi

8:43am December 13th 2014 via Falcon Pro

RT @raviborgaonkar: New security issues - covert channels and dos attacks - in Fiasco.OC microkernel. Just released from our group http://t.co/VCRoW0lLkS

8:41am December 13th 2014 via Falcon Pro

RT @Technologeeks: Nexus 9 Android #L partitions and #bootloader explored - http://t.co/KMtHtHWIvb, the companion site to J Levin's #Android #internals book

8:39am December 13th 2014 via Falcon Pro

RT @angealbertini: Preserving arcade games (static slides) https://t.co/dh0z24F4XM

8:28am December 13th 2014 via Falcon Pro

RT @collinrm: Mobile Security News Update December 2014: http://t.co/Ir3joh6MsF (hope to see you guys at #31C3)

8:18am December 13th 2014 via Falcon Pro

RT @kapitanpetko: Very beta Lollipop encryption password change support: https://t.co/NaMvL0jDKw

2:14pm December 9th 2014 via Falcon Pro

RT @LeviathanSec: Video game publishers are now banks. Concerned? Great article by @ussjoin http://t.co/6bD2wyhPxd

2:12pm December 9th 2014 via Falcon Pro

RT @jduck: assemblydextrous (adj) (of a person) able to read both AT&T and Intel assembly syntax equally well. #infosec #taxonomy #ontology

2:10pm December 9th 2014 via Falcon Pro

RT @Gunther_AR: Smali2Psuedojava - app that convert smali to psuedo java-like codes - https://t.co/ZYz4umg7cJ by Glenn in my team

11:02am December 8th 2014 via Falcon Pro

RT @virqdroid: Simplify - Generic Android Deobfuscator - https://t.co/fQ5AcNMAPU

11:01am December 8th 2014 via Falcon Pro

RT @razaina: 1) Obfuscating Android App using O-LLVM and the NDK http://t.co/6vNAN2AaKX 2) Recovering an O-LLVM-protected program http://t.co/8UsXpfzxdm

10:58am December 8th 2014 via Falcon Pro

RT @andremoulu: Deobfuscation: recovering an OLLVM-protected program by gg @quarkslab http://t.co/SPgP4hyT7S

2:19pm December 6th 2014 via Falcon Pro

RT @vlad902: Updated Android Census from 262 -> 333 device configurations (including 3 Android L), the code and data are all OSS: http://t.co/2UBAJDjYGn

8:32am December 5th 2014 via Falcon Pro

RT @reyammer: [Release] Grab'n Run: a new Android library to safely perform dynamic class loading! ~ https://t.co/oYvcgPQZjd. Kudos: @lfalsina & @phretor

11:43pm December 4th 2014 via Falcon Pro

RT @cryptax: Don't miss @_r04ch_ full paper on mobile botnets: https://t.co/skGWr6Lm6x @Botconf

11:43pm December 4th 2014 via Falcon Pro

RT @zxcvgm: inspired by @kapitanpetko, i dug into Android package verifiers. apparently sufficient verifiers seem to be a WIP. https://t.co/jx7Vl4lDhW

11:43pm December 4th 2014 via Falcon Pro

RT @Gunther_AR: [ Blog ] Android Internals Package Verifiers by @zxcvgm Great job bro https://t.co/bhRmOTIOVz

11:43pm December 4th 2014 via Falcon Pro

RT @NowSecureMobile: viaForensics is now @NowSecureMobile. Read more about our change from our CEO & co-founder @ahoog42: http://t.co/AHu2R8xaH3

9:21am December 3rd 2014 via Twitter Web Client