Creating inefficient IT, or hiding our own inefficiency behind ITWe, humans, normally have brains, and a heart, and we should use them more.Oct 16Oct 16
The Next Generation Conference FormatI have now been attending conference for … hum … several decades and I believe the traditional format of 30, 40 or 50-minute talks should…Oct 4Oct 4
Arguments descriptor arrays in DartWhile reading Dart assembly, you may have noticed lines such as the following:Sep 191Sep 191
Using AI-assisted decompilation of Radare2A few months ago, Radare2 (aka r2), an open source disassembler which can be entirely used by command line, started implementing AI plugins…Sep 17Sep 17
Dart shifts to standard calling conventionUp until Dart SDK v3.4.0, Dart was using an uncommon calling convention where all arguments for a function were passed on the stack [see my…Jul 19Jul 19
Untangling Android/TangleBotWe dig in a malicious sample of Android/TangleBot of May 2024. TangleBot is also reported as a BankBot, although it is more an Android RAT…Jul 121Jul 121
On the security of Google SecretsGoogle Secrets Gradle plugin is “for providing your secrets securely to your Android project”. I would like to make it clear in this…Jul 11Jul 11
Inside Sinchat Flutter riskwareIn this blog post, we analyze 2 borderline Flutter apps. As I’ll explain in conclusion, they are not malicious but expose borderline/risky…May 24May 24
Testing Restricted Settings of Android 13 on an emulatorAndroid 13 introduced a new security measure called “Restricted Settings”. The measure is meant to limit access to notification settings…Apr 4Apr 4
Phishing attempt on French e-tollsYesterday, I received a well-crafted phishing attempt email targeting users of a French e-toll company. While this email contains no mobile…Mar 21Mar 21