Tweets from March 2015

@rallat si pots ajuda al @Newlog_ que ve cap a California aviat i te dubtes de visats i aquestes coses :D

8:07pm March 31st 2015 via FalconPro3 BETA

RT @marcograss: Mine and @0xroot 's slides for BH Asia 15 - "The nightmare behind the cross platform mobile apps dream" - https://t.co/LxwkRw1YSd

7:13pm March 31st 2015 via FalconPro3 BETA

RT @AndroidTamer: The nightmare behind the cross platform mobile apps dream by @marcograss & @0xroot https://t.co/JnNwPCm9SV : #bhasia

7:13pm March 31st 2015 via FalconPro3 BETA

RT @AndroidTamer: We Can Still Crack You! General Unpacking Method for Android Packer (no root) : by Yeongung Park : https://t.co/zXQHP8m8Qb #bhasia

7:12pm March 31st 2015 via FalconPro3 BETA

RT @AndroidTamer: Resurrecting the READ_LOGS Permission on Samsung Devices : https://t.co/2jdkJjfwtY and https://t.co/zlgd8cafc0 : #bhasia

7:12pm March 31st 2015 via FalconPro3 BETA

RT @AndroidTamer: Relaying EMV Contactless Transactions Using Off-the-Shelf Android Devices: https://t.co/xQJ9awGh5w : https://t.co/KghZKtuXbG : #bhasia

7:12pm March 31st 2015 via FalconPro3 BETA

RT @AndroidTamer: Hiding Behind Android Runtime (ART) by Paul Sabanal https://t.co/mKgrYi0JKt and https://t.co/BgdOckmNeF #bhasia

7:12pm March 31st 2015 via FalconPro3 BETA

RT @AndroidTamer: DABiD The Powerful Interactive Android Debugger For Android Malware Analysis : https://t.co/GuqU5wa9JQ #BHASIA

7:12pm March 31st 2015 via FalconPro3 BETA

RT @FightCade: FightCade v0.40 has just been released! :) [+] Download: http://t.co/yLmj5eQUek [+] Release Notes: https://t.co/MRepQYBH55 Enjoy!

2:42pm March 31st 2015 via Twitter Web Client

RT @fmaelbrancke: Slides for my 'Android security for developers' talk at the jDays conference (Göteborg, Sweden) : https://t.co/uUeIpC9sKM

6:05am March 28th 2015 via FalconPro3 BETA

RT @LukasStefanko: Another collection of #Android Reverse Engineering & #Malware Analysis Tools http://t.co/NoD8toJmCD #ART #Dalvik #sandboxes #toolkits

6:04am March 28th 2015 via FalconPro3 BETA

RT @cryptax: #insomnihack #ctf writeup for the #android challenge: http://t.co/MlX4TVyA6O -> /me far away. Was retrieving files with testdisk...

5:44am March 28th 2015 via FalconPro3 BETA

@onceuponanop exciting news, and such a great team there in Swon :D

8:22pm March 27th 2015 via Twitter for Android in reply to onceuponanop

RT @Fuzion24: Slidedeck and repo for fuzzing Android's media framework: https://t.co/8RuQHndFsH https://t.co/DL6xRfaSN8

7:04am March 27th 2015 via FalconPro3 BETA

RT @claud_xiao: Chinese version of #AndroidHackersHandbook is for pre-order now: http://t.co/I82kmSE6wT Expected ship date is April 10.

7:04am March 27th 2015 via FalconPro3 BETA

RT @kapitanpetko: And apparently some? devices will allow you to flash your own boot.img verification keys: https://t.co/m8I9mzm0dd

7:03am March 27th 2015 via FalconPro3 BETA

RT @kapitanpetko: Finally, proper Android OTA documentation, recent addition? https://t.co/Q8Ize4JnWw

7:03am March 27th 2015 via FalconPro3 BETA

RT @NVISO_BE: Excited to announce that we have open sourced our bootloader unpacker and imgdata tools for Nexus 4, 5 and 7! http://t.co/eZKHqOA3bq

6:57am March 27th 2015 via FalconPro3 BETA

RT @angealbertini: the DEX file format: a poster of a "Hello World" Android executable https://t.co/Bef6gBhgVr http://t.co/0fTvWY7Gh3

6:49am March 27th 2015 via FalconPro3 BETA

RT @tehjh: @pof @Fuzion24 Old news. Already publicly mentioned that one in March 2013, #8 on the list at http://t.co/50wGxd6Olu

6:48am March 25th 2015 via FalconPro3 BETA

TOCTOU bug in packagemanager < Android 4.3 - http://t.co/vbkplzL6eA via @Fuzion24

7:27pm March 24th 2015 via Twitter Web Client

RT @erikeldridge: Wrangling dalvik: memory management in android http://t.co/JwfWAwdN7M

7:25pm March 24th 2015 via FalconPro3 BETA

RT @virqdroid: Around Android System Vulnerabilities - http://t.co/Qc7yToDaej (Chinese but Google translation is good to read)

7:49am March 21st 2015 via FalconPro3 BETA

RT @timstrazz: Hello “medusa” Android packer - https://t.co/KfiOigME0e (supposedly this is the “old” version) - jer.jar? That was easy…

7:01am March 20th 2015 via FalconPro3 BETA

RT @AndroidDev: Devs, it’s time to get your #AndroidAuto enabled apps in the Play Store. Hardware is now available! @waynepiekarski http://t.co/kRrFYZPWMp

6:56am March 20th 2015 via FalconPro3 BETA

RT @virqdroid: Detection and Prevention of Emulator Evading on Android (HideAndroidEmulator) - https://t.co/oipD2voVdF

6:04pm March 18th 2015 via FalconPro3 BETA

RT @Sh1bumi: Ladies and Gentlemen, the internet is burning again! CVE-2015-0209 CVE-2015-0285 CVE-2015-0288 #CVE #openssl http://t.co/KqqVXaRA3x

7:16am March 18th 2015 via FalconPro3 BETA

RT @CoreSecurity: Exim Mail Server GHOST Exploit Now Available http://t.co/w6EY5zG8cb

7:14am March 18th 2015 via FalconPro3 BETA

RT @Fuzion24: Remotely exploitable DHCP bug used at pwn2own for Android: http://t.co/s61DyDyyq1 && https://t.co/jRrNIs7bxm Fixed in 5.1

7:10am March 18th 2015 via FalconPro3 BETA

RT @Mobile_Sec: @anantshri @Abhinav_Sejpal according to the developer policy they should do security check against malware http://t.co/H0NAXM7vhL

7:09am March 18th 2015 via FalconPro3 BETA

RT @Mobile_Sec: Android apps are going to be manually reviewed by human experts before being available on GooglePlay,like Apple does. http://t.co/JuESg2epD6

7:09am March 18th 2015 via FalconPro3 BETA

RT @cryptax: Tools to diff #Android dex files: androsim (from #Androguard), ssdeep, #alligator ;), radiff2 (from #radare2).

7:03am March 18th 2015 via FalconPro3 BETA

RT @virqdroid: ApkProtect / RawDexClassLoader - https://t.co/ySdYpGDaPP

3:14pm March 16th 2015 via FalconPro3 BETA

Android for Work: Demystified - http://t.co/aFh0BuHKv3

6:41am March 16th 2015 via FalconPro3 BETA

RT @SakurityNetwork: How "../sms" could bypass Authy 2 Factor Authentication http://t.co/Olt3aJlbsv #RT

4:54am March 16th 2015 via FalconPro3 BETA

RT @5aelo: Interested in ARM exploitation? Here's the material of a workshop I prepared for my CTF team: https://t.co/ZY1kX8UWZu Feedback welcome! :)

4:41am March 16th 2015 via FalconPro3 BETA

RT @thuxnder: Uninstalling as well as "clear data" of Android Apps leaves apk extension files(obb) behind. This tainted my App startup test #thanksAndroid

4:40am March 16th 2015 via FalconPro3 BETA

RT @CISecurity: Android Browser Kitkat Content Spoofing Vulnerability @rafaybaloch http://t.co/tEHRmqsA23

5:04pm March 14th 2015 via FalconPro3 BETA

RT @Dinosn: ZDI-15-093: (Mobile Pwn2Own) Google Android DHCP Parsing Remote Code Execution Vulnerability http://t.co/BKlimMExKV

5:02pm March 14th 2015 via FalconPro3 BETA

RT @againsthimself: Qualcomm Mobile Security Summit 2015 agenda announcement https://t.co/W6EdDOcjiU

4:53pm March 14th 2015 via FalconPro3 BETA

RT @AndroidPolice: FYI: Google has confirmed Nexus 4/5/7/10 do not have Device Protection anti-theft. We've updated to reflect. http://t.co/UGKYq5WwnF

4:37pm March 14th 2015 via FalconPro3 BETA

RT @4Dgifts: Source code and APK of SNS-thief: proof-of-concept app that demonstrates the Samsung SNS vulns recently fixed. https://t.co/ApPKGZGPD0

4:34pm March 14th 2015 via FalconPro3 BETA

RT @Technologeeks: J says:Great. Google *again* changed #ART/#OAT in 5.1 (ver 0x323130). Back to drawing board #android #internals Vol2. http://t.co/hAcZErjwXJ

4:30pm March 14th 2015 via FalconPro3 BETA

RT @claud_xiao: Exploits of CVE-2015-1474(Android Integer Oveflow/Heap Corruption) and CVE-2015-1530 (Android Media Integer Overflow) http://t.co/fB5uDnozmo

10:25pm March 13th 2015 via FalconPro3 BETA

RT @Gunther_AR: [CVE-2015-1530]An integer overflow in Android media could be exploited to get media_server permission - http://t.co/VPe4rrgqnc

10:23pm March 13th 2015 via FalconPro3 BETA

RT @benhawkes: BitmapFactory is the idiomatic way to display images in Android applications. Send an image, cause heap corruption. https://t.co/a5xLh7m5qf

9:33pm March 12th 2015 via Twitter Web Client

@roman_soft felicidades, bienvenido al club de los papás! Un abrazo para los 3 :D

7:50am March 11th 2015 via FalconPro3 BETA in reply to roman_soft

RT @kapitanpetko: Yay? c9b2a70 Enable hardware backed disk encryption Nope: bd7e39d Revert "Enable hardware backed disk encryption

11:53pm March 10th 2015 via FalconPro3 BETA

RT @abelenko: Apple credited @NowSecureMobile and @abelenko with iCloud Keychain RCE in iOS (https://t.co/4OCgbh5Pf5) and OS X (https://t.co/cPakiGPpIV)

11:49pm March 10th 2015 via FalconPro3 BETA

RT @botherder: Examples of phone oddities from the last days. Just lovely. http://t.co/AZYBWVEJSd

9:54pm March 9th 2015 via FalconPro3 BETA

RT @Mobile_Sec: Useful tool, ClassNameDeobfuscator https://t.co/heJDQkPzrc Script to parse through the .smali files & extract the .source annotation lines.

9:50pm March 9th 2015 via FalconPro3 BETA

RT @BlackPian0: Common Android Wear Tasks for Security Researchers and Developers http://t.co/QdWE32Rs7B

9:49pm March 9th 2015 via FalconPro3 BETA

RT @AndroidTamer: The "Android: Back to the Future, Two or Too?" presentation by @raulsiles of @dinosec at @rootedcon http://t.co/GJGzxV7RzZ #rooted2015

11:10pm March 8th 2015 via FalconPro3 BETA

RT @AndroidTamer: Details about Tamper flag on android devices. Tamper flag confirms if the device is oem unlocked or not & its bypass https://t.co/uGOwK5aA

11:10pm March 8th 2015 via FalconPro3 BETA

RT @cgvwzq: Our slides for #Rooted2015 on NFC relay attacks with Android http://t.co/QO3lkdr9ix /cc @RicardoJRdez

11:02pm March 8th 2015 via FalconPro3 BETA

RT @mwrlabs: Watch You Lookin' At? @mwrlabs Jahmel Harris & Owen Evans Android Wear research as presented #SecuriTayIV now online http://t.co/Jq4YuVVTl6

10:36pm March 8th 2015 via FalconPro3 BETA

RT @0xroot: The slides for my talk "Demystifying Apple 'Pie' & TouchID" for #rooted2015 https://t.co/gCbSeS5YOb /cc @rootedcon

10:33pm March 8th 2015 via FalconPro3 BETA

RT @milkmix_: “@Pelissier_S: Electromagnetic fault injection to the instr cache of ARMv7-M: http://t.co/kAoIZqjGp4” < fuzzing in python feels lame ;)

10:31pm March 8th 2015 via FalconPro3 BETA

RT @detectify: New guest blog post: Finding an XSS in an HTML-based Android-application http://t.co/TJmKJ2ACgY by @_zulln

10:31pm March 8th 2015 via FalconPro3 BETA

RT @NowSecureMobile: Our booth #5I31 at #MWC15 featuring @pof - have you stopped by yet? Courtesy of @hansonb4 #mobilesecurity http://t.co/VoAadYfFhi

5:19pm March 4th 2015 via Twitter for Android

RT @Mobile_Sec: [BLOG POST] Android Security: The Forgetful Keystore http://t.co/rIerrpPeb6

3:07pm March 4th 2015 via FalconPro3 BETA

RT @WeldPond: GoPro website update mechanism exposes multiple users Wi-Fi passwords http://t.co/TfbJ9BpoCy

2:39pm March 4th 2015 via FalconPro3 BETA

RT @jduck: The @droidsec Wiki is now part of the main site proper - http://t.co/cQ5e35nyvL Thanks to @Gunther_AR for all of the excellent work!

10:02pm March 3rd 2015 via FalconPro3 BETA

@thomas_cannon look what i found at #MWC... are you around by any chance? :D http://t.co/Iz5L2sfFRT

4:22pm March 3rd 2015 via FalconPro3 BETA

RT @exploitprotocol: [Wiki Release] Android Security Wiki - One Stop for Android Security Resources.Please RT https://t.co/LLIKtKI39Q

3:53pm March 3rd 2015 via FalconPro3 BETA

RT @virqdroid: A collection that have to speak, teach and inform about the latest security and malware news on Android - https://t.co/7hpzYtxQl5 (updated)

3:53pm March 3rd 2015 via FalconPro3 BETA

RT @AndroidPolice: Google Will Not Require OEMs To Encrypt New Devices With Lollipop After All, But Does 'Very Strongly' Recommend It http://t.co/eSxbcnl5SC

9:23pm March 2nd 2015 via FalconPro3 BETA

RT @ohjeongwook: Just in case you wonder, the Samsung TV hack - which I presented at VB 2014- related files are here: https://t.co/FnTh1WQ2p0

9:13pm March 2nd 2015 via FalconPro3 BETA

RT @AndroidPolice: Samsung Pay Promises To Allow Tap-And-Pay At 90% Of Credit Card Terminals, Attacks Google Wallet And Apple Pay Head… http://t.co/tn3EGy5kHI

10:17pm March 1st 2015 via FalconPro3 BETA