Tweets from March 2016

@brookgamingfans Brook Universal Fighting Board installed on @MadCatz Fightstick Pro :) #fightstickfriday https://t.co/VdHoVllDWe

8:20pm March 30th 2016 via Twitter for Android

RT @laginimaineb: Great research by @firewaterdevs! Unlocking the GS5 using eMMC commands https://t.co/cQgf4b6qOv

3:38pm March 29th 2016 via FalconPro3

RT @AnonymousESQFL: This is exciting news! @CopperheadSec @guardianproject and F-Droid Partner to Build Open, Secure Mobile Ecosystem – https://t.co/tu9oHVzg

9:14pm March 28th 2016 via FalconPro3

RT @pluckljn: ss7MAPer – A SS7 pen testing toolkit #2G #3G #erlang ... https://t.co/lDfO7O07DD @Insinuator

8:20pm March 28th 2016 via FalconPro3

RT @ihackbanme: Generic Stagefright exploit for CVE-2015-3864 released ! git clone https://t.co/r3IS7vw6ZA Vulnerable % by country: https://t.co/MDybVZPZgS

2:50am March 28th 2016 via FalconPro3

@mountainmanjed what option is that? i want to test playing that way on a 16:9 monitor!

11:41pm March 23rd 2016 via FalconPro3 in reply to mountainmanjed

@doragasu espérate al próximo update que saldrá pronto y habrá algunos cambios en la versión de Linux :)

11:17am March 20th 2016 via FalconPro3 in reply to doragasu

RT @Kalzakath1: En el 171 de @fasebonus podéis escuchar la entrevista que @pof el creador de @FightCade nos otorgó.

3:00pm March 19th 2016 via FalconPro3

RT @virqdroid: Exploiting Android Stagefright with ASLR Bypass - https://t.co/BaiLCXuJeD

5:33am March 15th 2016 via FalconPro3

RT @CTurtE: Added a brief overview of how to setup and boot Linux on your PS4 to my article: https://t.co/xTnM8Yj45l. With thanks to @kr105rlz!

5:28am March 15th 2016 via FalconPro3

RT @ChainfireXDA: First SuperSU v2.69 test version for N Preview is available -https://t.co/UugwpXx7zs

5:19pm March 13th 2016 via FalconPro3

RT @AndroidTamer: BlackBerry Doing the Android thing in style. https://t.co/dau8EHbQKc <- 1-march-2016 update already pushing as an OTA

5:19pm March 13th 2016 via FalconPro3

RT @nasokan: #Nokia too had just 1 team writing TEE "Apps" 'cos it is painful/risky. ObC & Open-TEE are attempts to mitigate this https://t.co/E8PZPu0BXL

5:15pm March 13th 2016 via FalconPro3

RT @virqdroid: CuriousDroid: Automated User Interface Interaction for Android Application Analysis Sandboxes - https://t.co/2iiqoz8ORA (via @collinrm)

1:12am March 12th 2016 via FalconPro3

RT @jcase: Why would Google patch the TZ vuln in N, but not in the march update?

12:55am March 12th 2016 via FalconPro3

RT @jcase: Shame Shame Shame Shame Shame, Nexus 6's march security update is STILL vulnerable to @firewaterdevs trustzone exploit, after ~4 months

12:54am March 12th 2016 via FalconPro3

RT @andremoulu: Android: Stack Memory Corruption in BnBluetoothGattServer and BnBluetoothGatServerCallback IPC https://t.co/OGVFvWDmvm

12:50am March 12th 2016 via FalconPro3

RT @Fuzion24: Android kernel bugs CVE-2016-0819 && CVE-2016-0805 UAF and OOB access patched in the March '16 Nexus bulletin: https://t.co/o5jfFXoT7a

12:36am March 12th 2016 via FalconPro3

RT @Fuzion24: Nice slidedeck on the internals of the Android Emulator: https://t.co/a53vMgeD96

7:57am March 11th 2016 via FalconPro3

RT @collinrm: Mobile Security News Update March 2016 https://t.co/yr11mDyoFW #notmuchhappening

7:42am March 11th 2016 via FalconPro3

RT @djrbliss: https://t.co/4DVXqaYavD lines 1588, 1602, 1633, 2282. If eligible for bounty, please donate it to charity.

8:26pm March 10th 2016 via FalconPro3

RT @djrbliss: Android fixes obvious MediaTek wifi kernel driver buffer overflow while leaving four identical overflows in the code.

8:26pm March 10th 2016 via FalconPro3

RT @raulsiles: Android N Direct Boot adds a encryption model like iOS where the user passcode (for FDE) is not required at boot https://t.co/ftnNhtPqg2

12:35pm March 10th 2016 via Twitter for Android

RT @quarkslab: [BLOG+TOOL] Binmap: a system scanner https://t.co/9jjh00ka3I Vulnerability research is not only about luck, it is also about strategy

12:35pm March 10th 2016 via Twitter for Android

RT @ikoz: Certificate pinning, as implemented by several Java/Android apps & libraries, is remotely bypassable: https://t.co/hV15fVKkjm

12:34pm March 10th 2016 via Twitter for Android

@teroteki it's the sanwa red one, a bit darker than vermillion

10:44pm March 6th 2016 via Twitter for Android in reply to teroteki

@jifa I'm open to anything security related, specially involving Android or/and Linux.

1:59pm March 5th 2016 via Twitter for Android in reply to jifa

@kapitanpetko hahaha not sure yet, but that would be a very interesting option too :D

11:27am March 5th 2016 via Twitter for Android in reply to kapitanpetko

@timstrazz not sure yet, open to anything new right now :)

11:29pm March 4th 2016 via Twitter for Android in reply to timstrazz

@filmaj still unsure, looking for options...

4:54pm March 4th 2016 via FalconPro3 in reply to filmaj

@uberlaggydarwin nope, looking for new opportunities :)

4:51pm March 4th 2016 via FalconPro3 in reply to uberlaggydarwin

Today is my last day at @NowSecureMobile, it has been a pleasure working with an awesome research team for the past 3+ years!

4:28pm March 4th 2016 via Twitter Web Client