Endpoint

7/10/2018
12:30 PM
John Klossner
John Klossner
Cartoon Contest
50%
50%

Name That Toon: Mobile Threat

We provide the cartoon. You provide the caption.
We provide the cartoon. You provide the caption.

Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card. If you don't want to enter a caption, help us pick a winner by voting on the submissions. Click thumbs up for those you find funny; thumbs down, not so. As always, editorial comments are encouraged and welcomed.

Click here for contest rules. For advice on how to beat the competition, check out How To Win A Cartoon Caption Contest. The contest closes August 13.

Learn from the industry's most knowledgeable CISOs and IT security experts in a setting that is conducive to interaction and conversation. Register before July 27 and save $700! Click for more info

 

John Klossner has been drawing technology cartoons for more than 15 years. His work regularly appears in Computerworld and Federal Computer Week. His illustrations and cartoons have also been published in The New Yorker, Barron's, and The Wall Street Journal. Web site: ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 3 / 4   >   >>
joel.henry
0%
100%
joel.henry,
User Rank: Apprentice
7/12/2018 | 5:16:50 PM
You Wish
"The rules have changed. You now owe ME 3 wishes.
KCondit
50%
50%
KCondit,
User Rank: Apprentice
7/12/2018 | 5:02:16 PM
Name That Toon: Mobile Threat
Sorry, you've already used your three wishes, so I can't bring back the headphone jack.

 
sgtljb
50%
50%
sgtljb,
User Rank: Apprentice
7/12/2018 | 2:55:35 PM
Caption Contest
Kid: I wish you can make my Android Cyber Secure. Genie:Kid you ask too much! Buy an Apple!
JoeB1Kanobe
67%
33%
JoeB1Kanobe,
User Rank: Apprentice
7/12/2018 | 12:58:50 PM
World Peace
"World Peace would be easier than getting more than 1 bar here"
acampbell448
0%
100%
acampbell448,
User Rank: Ninja
7/12/2018 | 10:11:16 AM
Just Dreamin....
I will grant you an extra wish if you hook me up with Barbara Eden!
jmansier
0%
100%
jmansier,
User Rank: Apprentice
7/12/2018 | 8:47:08 AM
Caption Content!
"Dang this new 2FA is amazing!" 
Therion
50%
50%
Therion,
User Rank: Apprentice
7/11/2018 | 9:54:35 PM
Chicken Dinner
"You really want to use a wish to improve Windows Updates?"
SubKleener
67%
33%
SubKleener,
User Rank: Apprentice
7/11/2018 | 5:58:37 PM
To make your first wish, click on the link below...
To make your first wish, click on the link below...
GWAIN
60%
40%
GWAIN,
User Rank: Strategist
7/11/2018 | 4:54:34 PM
HTML5 Popups
You are today's 99th winner of an Amazon gift card!
Mike Atkinson
50%
50%
Mike Atkinson,
User Rank: Apprentice
7/11/2018 | 2:14:26 PM
Name that toon: Mobile Threat
"You're seeing this ad because you recently visited websites loosely related to genies. To opt out..."
<<   <   Page 3 / 4   >   >>
White House Cybersecurity Strategy at a Crossroads
Kelly Jackson Higgins, Executive Editor at Dark Reading,  7/17/2018
Mueller Probe Yields Hacking Indictments for 12 Russian Military Officers
Kelly Jackson Higgins, Executive Editor at Dark Reading,  7/13/2018
10 Ways to Protect Protocols That Aren't DNS
Curtis Franklin Jr., Senior Editor at Dark Reading,  7/16/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-10869
PUBLISHED: 2018-07-19
redhat-certification does not properly restrict files that can be download through the /download page. A remote attacker may download any file accessible by the user running httpd.
CVE-2018-10870
PUBLISHED: 2018-07-19
redhat-certification does not properly sanitize paths in rhcertStore.py:__saveResultsFile. A remote attacker could use this flaw to overwrite any file, potentially gaining remote code execution.
CVE-2018-12959
PUBLISHED: 2018-07-19
The approveAndCall function of a smart contract implementation for Aditus (ADI), an Ethereum ERC20 token, allows attackers to steal assets (e.g., transfer all contract balances into their account).
CVE-2018-14336
PUBLISHED: 2018-07-19
TP-Link WR840N devices allow remote attackers to cause a denial of service (connectivity loss) via a series of packets with random MAC addresses.
CVE-2018-10620
PUBLISHED: 2018-07-19
AVEVA InduSoft Web Studio v8.1 and v8.1SP1, and InTouch Machine Edition v2017 8.1 and v2017 8.1 SP1 a remote user could send a carefully crafted packet to exploit a stack-based buffer overflow vulnerability during tag, alarm, or event related actions such as read and write, with potential for code t...