RT @AndroidPolice: LG posts January security bulletin ahead of Google with Android and LG-specific patches https://t.co/0dP4WgekgN https://t.co/XF54UQj450
RT @collinrm: "Dissecting modern (3G/4G) cellular modems" https://t.co/e4x2SoUvP9 #33c3
RT @radareorg: CCC have published the video of @trufae's talk "Demystifying radare2" https://t.co/b8wBxsOjvi
Street Fighter MOTD: https://t.co/wGqJS9YPRy https://t.co/163S2jRwAJ
RT @ProjectZeroBugs: Android: Heap-overflow in "tlc_server" via LOAD_TUI_RESOURCE command https://t.co/4DbiMxkYdG
RT @vanhoefm: Slides of my #33c3 talk "Predicting and Abusing WPA2/802.11 Group Keys" https://t.co/jzs1yLb8xL PDF slides at https://t.co/Wtn3XVyCBB
RT @marcan42: #33c3 talk slides uploaded: https://t.co/c4p8swv6p1 (blog post coming later once I get some time)
RT @marcos_placona: It's xmas and what better time to think about #security in your #android apps? I wrote a series of #androiddev post… https://t.co/hoG8C8DN
RT @Junior_Baines: Been coding anti-reversing techniques for Linux. I've pushed a repo and a "book" with techniques / analysis. Enjoy: https://t.co/mwllLm38xQ
RT @ZeroNights: Slides #ZeroNights 2016 https://t.co/aozWeupWbv
RT @IOActive: Join @IOActive and your security industry peers for another fantastic year in San Francisco @IOActive #IOAsis https://t.co/x5Y4XWTMmc
RT @ChainfireXDA: SuperSU v2.79-SR1 released https://t.co/6mMr4IaRv0
RT @Dinosn: backdoor-apk - shell script that simplifies the process of adding a backdoor to any Android APK file https://t.co/9zsvTDXEb4
RT @AndroidDev: The process of setting up an Android Emulator with full acceleration and performance explained:… https://t.co/KVO3OVxIkG
RT @IOActive: New @IOActive blog: @reversemode finds security #vulns in airline in-flight entertainment systems https://t.co/RkosUimk35 #aviationsecurity
RT @ProjectZeroBugs: Android - Stack overflow in WifiNative::setHotlist https://t.co/9Cwxjq9xTp
RT @GabrielGonzalez: awesome research by @reversemode on inflight infotainment systems! https://t.co/nwrhC8Rv9o
@eltroubleSRK @grandmaster_uk no need to hold fierce on the ud-usb decoders as well. /cc @therealundamned
9:43pm December 18th 2016 via FalconPro3 in reply to eltroubleSRK
@georgemcgown @ikoz me neither, using my own mail server, but google knows everything anyway }:-)
9:17pm December 18th 2016 via Twitter for Android in reply to georgemcgown
@georgemcgown not a huge deal for me, predictions work surprisingly well even with no previous training
9:11pm December 18th 2016 via Twitter for Android in reply to georgemcgown
@cbruegg yes, i use it with 3 languages now; that was the primary reason why I wasn't using it before
9:06pm December 18th 2016 via Twitter for Android in reply to cbruegg
switched to Gboard (google keyboard) again after a very long time using Swiftkey. Greatly surprised about how well it works now 👌
RT @Dinosn: An Open Source Tool for Visually Analyzing and Diffing SELinux/SE for Android Security Policies https://t.co/CETGuucMAP
RT @benhawkes: Project Zero exploit for iOS 10.1.1 by Ian Beer: https://t.co/WI8tIVloNa
RT @muellerberndt: Call for authors: The ultimate mobile open-source mobile app reverse engineering guide https://t.co/x5Wcc48fCl
RT @s7ephen: We started using RancherOS. It's awesome. It's a Linux distro (under 90Meg). Every process gets hardware sandboxed… https://t.co/itpritmJ2H
RT @Morpheus______: #Android #JTrace now universal (x86, ARM32/64) with ARCHITECTURE-AGNOSTIC PLUGIN API!!! make own #syscall #hooks!… https://t.co/LlVvQ2vz8i
RT @Jhaddix: Mobile Application Testing Cheatsheet and Testing Checklist - https://t.co/joUS0jcCoG
RT @ikoz: Android Things OS: https://t.co/RCL38ULN8F & sample apps: https://t.co/sSWmpVAhb8
RT @arstechnica: Google’s new “Android Things†OS hopes to solve awful IoT security https://t.co/qtLghWBT8O by @RonAmadeo
RT @laginimaineb: @laginimaineb I think the main take away here is that it's necessary to restrict trustlet access using fine-grained access controls. 3/3
RT @laginimaineb: @laginimaineb see https://t.co/ZDEdRYXHJN and https://t.co/BwHHiV5L6E. 2/3
RT @laginimaineb: Derestricted a couple of interesting bugs; TrustZone code execution from any app with no required permissions on Samsung devices. 1/3
RT @collinrm: Mobile Security News Update December 2016 https://t.co/0WdT1U30mj #android #infosec Catching up after my vacation!
RT @ProjectZeroBugs: Stack buffer overflow and information disclosure in OTP TrustZone trustlet via OTP_GET_CRYPTO_DERIVED_KEY https://t.co/eEvEv5Svn3
@PaulOBrien check this out if you haven't yet https://t.co/zJheIjyWWn
RT @trailofbits: Meet Algo, the VPN that works https://t.co/7kLiQTHLBq
@jcase did you link your phone number to that account? that might be the reason (Facebook has WhatsApp contacts too) https://t.co/lOAqvUiVZx
RT @hdmoore: SELinux, Seccomp, Falco, and You: A Technical Discussion https://t.co/EpFNaB95Uc
@jopito @jbarrio si, con el SDK puedes seleccionar el "target" para cada API level y crear un AVD con la versión que necesitas
2:14pm December 8th 2016 via Twitter for Android in reply to jopito
RT @TrendLabs: New post: New Flavor of Dirty COW Attack Discovered, Patched https://t.co/YUCySr7zjD @TrendMicro
RT @Fuzion24: POC for CVE-2016-8655 Linux kernel AF_PACKET UaF https://t.co/wImpY6jv8A
RT @CopperheadOS: Google refers to remote CTS profile checks as attestation here: https://t.co/GrgtT2XrZr. It's a stretch, but reveals what they want from it.
RT @AndroidDev: See how Google Play is reducing app update sizes by 65% https://t.co/DG3E3qK3uF #GooglePlay
RT @munmap: Our #MP2O Chrome bug, rated critical, has now been patched. https://t.co/gS0cyQLg6s Details to follow… https://t.co/JKKdVLodGq
RT @fristle: https://t.co/KMcjjGsdzJ A bug bounty for the Nintendo 3DS firmware. Top award $20k; will probably impact 0-day sharing btwn console hackers.
"On Android, processes with gid=3004 are able to create AF_PACKET sockets (mediaserver) and can trigger the bug" https://t.co/YD0sGiFoMV
RT @againsthimself: Save the date: 2017 Qualcomm Mobile Security Summit will be May 18-19 (paintball on May 20). CFP coming soon.
RT @CopperheadOS: December Android Security Bulletin: https://t.co/uEQ0IcVugo. It's also the stable release of 7.1.1, which is the first Nexus 7.1.x release.
RT @Dor3s: Google Open Source Blog: Announcing OSS-Fuzz: Continuous fuzzing for open source software https://t.co/KfhDKHLoZC via @google
RT @Mobile_Sec: A detailed security assessment on Android Full Disk Encryption: https://t.co/ULTpQ0VIHK
RT @rotlogix: Map sockets to processes on Android - https://t.co/RGph1qGais
RT @ProjectZeroBugs: Android - IOMXNodeInstance::enableNativeBuffers unchecked index https://t.co/Rc71sUqM3G
RT @ProjectZeroBugs: Android: Code loading bypasses in system_server https://t.co/VZjgoNXpJd
RT @caleb_fenton: "Building with and Detecting Jack" (the android compiler) https://t.co/LpAMDBQyn3 https://t.co/QEttS01xEb
RT @ProjectZeroBugs: Android: mitigation bypass - the guard page creation in IOMX can fail https://t.co/ohQ1nNFL3B
RT @ihackbanme: Analysis of multiple vulnerabilities in AirDroid https://t.co/TpoNIvyhmz by @evilsocket
RT @laginimaineb: Just published a new blog post! Using Android's ashmem to escalate privileges from any context. As always, exploits… https://t.co/jwx4q6YNR5
RT @ProjectZeroBugs: Android: inter-process munmap with user-controlled size in https://t.co/ChtyRCFsu4.Bitmap https://t.co/yrVwH5Fssl
RT @revskills: BitUnmap: Attacking Android Ashmem https://t.co/q7wtxNhB6n
RT @opersys: "Memory Management in Android" talk at AnDevCon San Francisco 2016: https://t.co/5ksrOlPQ7e
Adrian Ludwig comments on Ghost Push / Gooligan Android Malware - https://t.co/vTZpwMIDGv
RT @singe: I got sick of being restricted by wifi frequency regulation and made this https://t.co/DMny8ySuLi for the discerning wifi hacker.