EZGallery Resim Galerisi Scripti version 2.0 suffers from a database disclosure vulnerability.
Monthly Archives: October 2016
MyDesign Haber Scripti 7 Database Disclosure
MyDesign Haber Scripti version 7 suffers from a database disclosure vulnerability.
PC Toplama 2.0 Database Disclosure
PC Toplama version 2.0 suffers from a database disclosure vulnerability.
Police Scan 117 Million Driving Licence Photos for Face Recognition Database
Your driver’s license photo could be scarier than it actually looks — Well, here’s why:
With the help of state driver’s license data, U.S. law enforcement agencies have created a huge a face-recognition database of more than 117 Million American adults that are regularly scanned in the course of police investigations.
What’s even worse? Most of those people who are scanned by police without
![]()
Malware posing as Dual Instance app steals users’ Twitter credentials

Do you have more than one Twitter or WhatsApp account? If you answered yes, do you want to log in to these multiple accounts at the same time? Up until this point, logging in to multiple social media accounts at one time has only been possible by using more than one mobile device. Dual Instance is a technique that allows you to run more than one instance of a mobile application simultaneously. As we know, it never takes malware authors long to catch on to new trends, so cybercriminals have recently taken it upon themselves to create malicious versions of Dual Instance apps.
![]()
US presidential debates and cyber security.

What we’ve learned from the first two debates and what to expect from the last one?
One of the major questions discussed during the 1st presidential debate between Donald Trump and Hillary Clinton was about cyber security. We were secretly hoping that questions about cyber safety will be part of the topic list in the 2nd debate too but unfortunately this was not exactly the case.
Discussions around Donald Trump’s recently leaked “locker room talk” recording ended up being a bit more entertaining for the moderators than the cyber future of the free world. However, we hope the cyber security topic will be discussed again in the third and final presidential debate scheduled for later today.
The next president of the United States of America will have to make some hard decisions. See what they are below;
Government and private institutions are under attack!
Both candidates admitted that there is a 21st century war that is happening right now and right here in the USA. Even though that USA is certainly one of the dominating powers in this area, secrets are being stolen from both public and private sectors on a daily basis.
Hundreds of thousands of people and businesses are being affected by cybercrimes every year.
Who is behind it and how to tackle the problem?
According to Hillary Clinton, the threat is coming from organized cyber gangs as well as states. Even though there is no hard proof, there’s been speculation that North Korea, Iran, Russia and China have been behind some of the cyber-attacks executed on US soil. How are these issues going to be dealt with? Stay tuned.
How dangerous are whistle-blowers?
This is the question we will most likely see tonight. Pressuring Ecuador to cut off the internet of Julian Assange is not doing USA any good. Countries such as Russia welcome whistle-blowers. Are whistle-blowers heroes protecting the first amendment or traitors? We would love to hear the thoughts of the next president of the USA.
Being president of the free world is arguably one of the toughest jobs in the world.
Just one thing is sure, the debate later today will be fierce!
The post US presidential debates and cyber security. appeared first on Panda Security Mediacenter.
Adobe Flash Player Memory Corruption (APSB16-32: CVE-2016-6985; CVE-2016-6985)
A memory corruption vulnerability exists in Adobe Flash Player. The vulnerability is due to an error in Adobe Flash Player while parsing a specially crafted SWF file. A remote attacker can exploit this issue by enticing a victim to open a specially crafted SWF file.
Adobe Flash Player Memory Corruption (APSB16-32: CVE-2016-6982; CVE-2016-6982)
A memory corruption vulnerability exists in Adobe Flash Player. The vulnerability is due to an error in Adobe Flash Player while parsing a specially crafted SWF file. A remote attacker can exploit this issue by enticing a victim to open a specially crafted SWF file.
Adobe Flash Player Memory Corruption (APSB16-32: CVE-2016-6986; CVE-2016-6986)
A memory corruption vulnerability exists in Adobe Flash Player. The vulnerability is due to an error in Adobe Flash Player while parsing a specially crafted SWF file. A remote attacker can exploit this issue by enticing a victim to open a specially crafted SWF file.
PHP 7 Unserialization Hash Table Resize Use After Free
A Use After Free vulnerability exists in PHP 7. A remote attacker can exploit this vulnerability by sending specially crafted input to the unserialize() function.
