Tweets from December 2016

RT @AndroidPolice: LG posts January security bulletin ahead of Google with Android and LG-specific patches https://t.co/0dP4WgekgN https://t.co/XF54UQj450

12:18am December 31st 2016 via FalconPro3

RT @collinrm: "Dissecting modern (3G/4G) cellular modems" https://t.co/e4x2SoUvP9 #33c3

10:23pm December 29th 2016 via FalconPro3

RT @radareorg: CCC have published the video of @trufae's talk "Demystifying radare2" https://t.co/b8wBxsOjvi

4:08pm December 29th 2016 via Twitter for Android

RT @ProjectZeroBugs: Android: Heap-overflow in "tlc_server" via LOAD_TUI_RESOURCE command https://t.co/4DbiMxkYdG

6:15am December 29th 2016 via FalconPro3

RT @vanhoefm: Slides of my #33c3 talk "Predicting and Abusing WPA2/802.11 Group Keys" https://t.co/jzs1yLb8xL PDF slides at https://t.co/Wtn3XVyCBB

4:23pm December 28th 2016 via FalconPro3

RT @marcan42: #33c3 talk slides uploaded: https://t.co/c4p8swv6p1 (blog post coming later once I get some time)

9:55am December 28th 2016 via FalconPro3

RT @marcos_placona: It's xmas and what better time to think about #security in your #android apps? I wrote a series of #androiddev post… https://t.co/hoG8C8DN

7:05pm December 25th 2016 via FalconPro3

RT @Junior_Baines: Been coding anti-reversing techniques for Linux. I've pushed a repo and a "book" with techniques / analysis. Enjoy: https://t.co/mwllLm38xQ

10:38am December 24th 2016 via FalconPro3

RT @IOActive: Join @IOActive and your security industry peers for another fantastic year in San Francisco @IOActive #IOAsis https://t.co/x5Y4XWTMmc

8:42am December 23rd 2016 via FalconPro3

RT @Dinosn: backdoor-apk - shell script that simplifies the process of adding a backdoor to any Android APK file https://t.co/9zsvTDXEb4

8:28pm December 22nd 2016 via FalconPro3

RT @AndroidDev: The process of setting up an Android Emulator with full acceleration and performance explained:… https://t.co/KVO3OVxIkG

8:18pm December 22nd 2016 via FalconPro3

RT @IOActive: New @IOActive blog: @reversemode finds security #vulns in airline in-flight entertainment systems https://t.co/RkosUimk35 #aviationsecurity

8:09pm December 20th 2016 via FalconPro3

RT @ProjectZeroBugs: Android - Stack overflow in WifiNative::setHotlist https://t.co/9Cwxjq9xTp

8:09pm December 20th 2016 via FalconPro3

RT @GabrielGonzalez: awesome research by @reversemode on inflight infotainment systems! https://t.co/nwrhC8Rv9o

7:50pm December 20th 2016 via FalconPro3

@eltroubleSRK @grandmaster_uk no need to hold fierce on the ud-usb decoders as well. /cc @therealundamned

9:43pm December 18th 2016 via FalconPro3 in reply to eltroubleSRK

@georgemcgown @ikoz me neither, using my own mail server, but google knows everything anyway }:-)

9:17pm December 18th 2016 via Twitter for Android in reply to georgemcgown

@georgemcgown not a huge deal for me, predictions work surprisingly well even with no previous training

9:11pm December 18th 2016 via Twitter for Android in reply to georgemcgown

@cbruegg yes, i use it with 3 languages now; that was the primary reason why I wasn't using it before

9:06pm December 18th 2016 via Twitter for Android in reply to cbruegg

switched to Gboard (google keyboard) again after a very long time using Swiftkey. Greatly surprised about how well it works now 👌

9:02pm December 18th 2016 via FalconPro3

@collinrm @jduck missing in action 🕵️

5:22pm December 18th 2016 via FalconPro3 in reply to collinrm

RT @Dinosn: An Open Source Tool for Visually Analyzing and Diffing SELinux/SE for Android Security Policies https://t.co/CETGuucMAP

9:29pm December 16th 2016 via FalconPro3

RT @benhawkes: Project Zero exploit for iOS 10.1.1 by Ian Beer: https://t.co/WI8tIVloNa

9:55am December 16th 2016 via FalconPro3

RT @muellerberndt: Call for authors: The ultimate mobile open-source mobile app reverse engineering guide https://t.co/x5Wcc48fCl

10:02pm December 15th 2016 via FalconPro3

RT @s7ephen: We started using RancherOS. It's awesome. It's a Linux distro (under 90Meg). Every process gets hardware sandboxed… https://t.co/itpritmJ2H

7:56pm December 14th 2016 via FalconPro3

RT @Morpheus______: #Android #JTrace now universal (x86, ARM32/64) with ARCHITECTURE-AGNOSTIC PLUGIN API!!! make own #syscall #hooks!… https://t.co/LlVvQ2vz8i

7:55pm December 14th 2016 via FalconPro3

RT @Jhaddix: Mobile Application Testing Cheatsheet and Testing Checklist - https://t.co/joUS0jcCoG

10:26pm December 13th 2016 via FalconPro3

RT @arstechnica: Google’s new “Android Things” OS hopes to solve awful IoT security https://t.co/qtLghWBT8O by @RonAmadeo

10:23pm December 13th 2016 via FalconPro3

RT @laginimaineb: @laginimaineb I think the main take away here is that it's necessary to restrict trustlet access using fine-grained access controls. 3/3

10:19pm December 13th 2016 via FalconPro3

RT @laginimaineb: Derestricted a couple of interesting bugs; TrustZone code execution from any app with no required permissions on Samsung devices. 1/3

10:19pm December 13th 2016 via FalconPro3

RT @collinrm: Mobile Security News Update December 2016 https://t.co/0WdT1U30mj #android #infosec Catching up after my vacation!

10:16pm December 13th 2016 via FalconPro3

RT @ProjectZeroBugs: Stack buffer overflow and information disclosure in OTP TrustZone trustlet via OTP_GET_CRYPTO_DERIVED_KEY https://t.co/eEvEv5Svn3

10:14pm December 13th 2016 via FalconPro3

RT @trailofbits: Meet Algo, the VPN that works https://t.co/7kLiQTHLBq

8:06pm December 12th 2016 via FalconPro3

@jcase did you link your phone number to that account? that might be the reason (Facebook has WhatsApp contacts too) https://t.co/lOAqvUiVZx

12:26pm December 11th 2016 via FalconPro3 in reply to jcase

RT @hdmoore: SELinux, Seccomp, Falco, and You: A Technical Discussion https://t.co/EpFNaB95Uc

1:36pm December 10th 2016 via FalconPro3

@jopito @jbarrio si, con el SDK puedes seleccionar el "target" para cada API level y crear un AVD con la versión que necesitas

2:14pm December 8th 2016 via Twitter for Android in reply to jopito

RT @TrendLabs: New post: New Flavor of Dirty COW Attack Discovered, Patched https://t.co/YUCySr7zjD @TrendMicro

5:08pm December 7th 2016 via FalconPro3

RT @Fuzion24: POC for CVE-2016-8655 Linux kernel AF_PACKET UaF https://t.co/wImpY6jv8A

3:26pm December 7th 2016 via FalconPro3

RT @CopperheadOS: Google refers to remote CTS profile checks as attestation here: https://t.co/GrgtT2XrZr. It's a stretch, but reveals what they want from it.

7:33am December 7th 2016 via FalconPro3

RT @AndroidDev: See how Google Play is reducing app update sizes by 65% https://t.co/DG3E3qK3uF #GooglePlay

9:21pm December 6th 2016 via FalconPro3

RT @munmap: Our #MP2O Chrome bug, rated critical, has now been patched. https://t.co/gS0cyQLg6s Details to follow… https://t.co/JKKdVLodGq

9:02pm December 6th 2016 via FalconPro3

RT @fristle: https://t.co/KMcjjGsdzJ A bug bounty for the Nintendo 3DS firmware. Top award $20k; will probably impact 0-day sharing btwn console hackers.

8:55pm December 6th 2016 via FalconPro3

"On Android, processes with gid=3004 are able to create AF_PACKET sockets (mediaserver) and can trigger the bug" https://t.co/YD0sGiFoMV

8:43pm December 6th 2016 via FalconPro3

RT @againsthimself: Save the date: 2017 Qualcomm Mobile Security Summit will be May 18-19 (paintball on May 20). CFP coming soon.

8:27pm December 6th 2016 via FalconPro3

RT @CopperheadOS: December Android Security Bulletin: https://t.co/uEQ0IcVugo. It's also the stable release of 7.1.1, which is the first Nexus 7.1.x release.

8:14pm December 6th 2016 via FalconPro3

RT @Dor3s: Google Open Source Blog: Announcing OSS-Fuzz: Continuous fuzzing for open source software https://t.co/KfhDKHLoZC via @google

11:40am December 5th 2016 via FalconPro3

RT @Mobile_Sec: A detailed security assessment on Android Full Disk Encryption: https://t.co/ULTpQ0VIHK

6:50am December 3rd 2016 via FalconPro3

RT @rotlogix: Map sockets to processes on Android - https://t.co/RGph1qGais

6:37am December 3rd 2016 via FalconPro3

RT @ProjectZeroBugs: Android - IOMXNodeInstance::enableNativeBuffers unchecked index https://t.co/Rc71sUqM3G

6:34am December 3rd 2016 via FalconPro3

RT @ProjectZeroBugs: Android: Code loading bypasses in system_server https://t.co/VZjgoNXpJd

6:23am December 3rd 2016 via FalconPro3

RT @caleb_fenton: "Building with and Detecting Jack" (the android compiler) https://t.co/LpAMDBQyn3 https://t.co/QEttS01xEb

6:17am December 3rd 2016 via FalconPro3

RT @ProjectZeroBugs: Android: mitigation bypass - the guard page creation in IOMX can fail https://t.co/ohQ1nNFL3B

12:34am December 2nd 2016 via FalconPro3

RT @ihackbanme: Analysis of multiple vulnerabilities in AirDroid https://t.co/TpoNIvyhmz by @evilsocket

12:32am December 2nd 2016 via FalconPro3

RT @laginimaineb: Just published a new blog post! Using Android's ashmem to escalate privileges from any context. As always, exploits… https://t.co/jwx4q6YNR5

12:26am December 2nd 2016 via FalconPro3

RT @ProjectZeroBugs: Android: inter-process munmap with user-controlled size in https://t.co/ChtyRCFsu4.Bitmap https://t.co/yrVwH5Fssl

12:25am December 2nd 2016 via FalconPro3

RT @revskills: BitUnmap: Attacking Android Ashmem https://t.co/q7wtxNhB6n

12:25am December 2nd 2016 via FalconPro3

RT @opersys: "Memory Management in Android" talk at AnDevCon San Francisco 2016: https://t.co/5ksrOlPQ7e

9:31am December 1st 2016 via FalconPro3

Adrian Ludwig comments on Ghost Push / Gooligan Android Malware - https://t.co/vTZpwMIDGv

8:47am December 1st 2016 via Twitter Web Client

RT @singe: I got sick of being restricted by wifi frequency regulation and made this https://t.co/DMny8ySuLi for the discerning wifi hacker.

8:19am December 1st 2016 via FalconPro3