Endpoint

10/19/2018
12:30 PM
John Klossner
John Klossner
Cartoon Contest
100%
0%

Cartoon: Body Metrics

John Klossner has been drawing technology cartoons for more than 15 years. His work regularly appears in Computerworld and Federal Computer Week. His illustrations and cartoons have also been published in The New Yorker, Barron's, and The Wall Street Journal. Web site: ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Page 1 / 2   >   >>
dskquality
100%
0%
dskquality,
User Rank: Apprentice
11/9/2018 | 10:47:58 AM
Re: Check out the latest from John Klossner
You know, at first glance, I liked the idea of wearable tech.. Never through it would be a security risk.
REISEN1955
100%
0%
REISEN1955,
User Rank: Ninja
11/5/2018 | 10:29:47 AM
Re: The Bright Side
Did you really say we'll make the deal or give you the clothes off our back?
PanamaVet
50%
50%
PanamaVet,
User Rank: Strategist
11/5/2018 | 9:07:20 AM
The Bright Side
We were the top site on Insecam yesterday!
TimBerdon
50%
50%
TimBerdon,
User Rank: Apprentice
11/2/2018 | 3:44:58 PM
Scanning
I know that Coverity is expensive, but it now does Firmware, Software, and Underwear scanning.
meonly
100%
0%
meonly,
User Rank: Strategist
10/31/2018 | 11:50:41 AM
Latest Access Control Security Implementation
You know I always knew our company's security was top-notch but with this latest security measure I think they went to far.
FKREITZBERG980
100%
0%
FKREITZBERG980,
User Rank: Strategist
10/26/2018 | 4:48:02 PM
Smart Home
That was not what I was expecting from a presentation titled "Exposing the Privacy Risk of the Smart Home"
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
10/23/2018 | 4:12:35 PM
Re: Check out the latest from John Klossner
There's yet another suggestive joke in there somewhere about the "Something You Do" biometrics factor...
REISEN1955
100%
0%
REISEN1955,
User Rank: Ninja
10/23/2018 | 10:54:35 AM
Re: Check out the latest from John Klossner
Sam and Rose have taken security tranparency to the next level.
M0nk3
25%
75%
M0nk3,
User Rank: Strategist
10/23/2018 | 12:57:00 AM
Just try and relax...
At first I thought; McAfee has gotten a little too literal with their new Endpoint Security implementation.  Now I find it's not a bad way to spend a morning, and it's brought me and the misses closer together.
SXDude
67%
33%
SXDude,
User Rank: Strategist
10/22/2018 | 11:45:35 AM
Vegas Baby
Vegas hotels trail new security measures for 2019 Black Hat event.
Page 1 / 2   >   >>
Government Shutdown Brings Certificate Lapse Woes
Curtis Franklin Jr., Senior Editor at Dark Reading,  1/11/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
The Year in Security 2018
This Dark Reading Tech Digest explores the biggest news stories of 2018 that shaped the cybersecurity landscape.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-6443
PUBLISHED: 2019-01-16
An issue was discovered in NTPsec before 1.1.3. Because of a bug in ctl_getitem, there is a stack-based buffer over-read in read_sysvars in ntp_control.c in ntpd.
CVE-2019-6444
PUBLISHED: 2019-01-16
An issue was discovered in NTPsec before 1.1.3. process_control() in ntp_control.c has a stack-based buffer over-read because attacker-controlled data is dereferenced by ntohl() in ntpd.
CVE-2019-6445
PUBLISHED: 2019-01-16
An issue was discovered in NTPsec before 1.1.3. An authenticated attacker can cause a NULL pointer dereference and ntpd crash in ntp_control.c, related to ctl_getitem.
CVE-2019-6446
PUBLISHED: 2019-01-16
An issue was discovered in NumPy 1.16.0 and earlier. It uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object, as demonstrated by a numpy.load call.
CVE-2019-6442
PUBLISHED: 2019-01-16
An issue was discovered in NTPsec before 1.1.3. An authenticated attacker can write one byte out of bounds in ntpd via a malformed config request, related to config_remotely in ntp_config.c, yyparse in ntp_parser.tab.c, and yyerror in ntp_parser.y.