Civil authorities in your area have reported that the bodies of the dead are rising from their graves and attacking the living. Follow the messages onscreen that will be updated as information become available. Do not attempt to approach or apprehend these bodies as they are considered extremely dangerous.
The Great Falls Tribune quotes Lt. Shane Sorensen with the GFPD: "We had four calls checking to see if it was true. And then I thought, 'Wait. What if?'" Sorensen said with a laugh. "We can report in the city, there have been no sightings of dead bodies rising from the ground."
Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.
Follow Larry Seltzer and BYTE on Twitter, Facebook, LinkedIn, and Google+:
- @lseltzer @BYTE
- Larry Seltzer BYTE
- Larry Seltzer on LinkedIn BYTE
- Larry Seltzer on Google+
View Full Bio
Dark Reading Must Reads - September 25, 2014Dark Reading's new Must Reads is a compendium of our best recent coverage of identity and access management. Learn about access control in the age of HTML5, how to improve authentication, why Active Directory is dead, and more.
DevOps’ Impact on Application SecurityManaging the interdependency between software and infrastructure is a thorny challenge. Often, it’s a “developers are from Mars, systems engineers are from Venus” situation.
Published: 2014-10-01 Cross-site scripting (XSS) vulnerability in facebook.php in the GRAND FlAGallery plugin (flash-album-gallery) before 1.57 for WordPress allows remote attackers to inject arbitrary web script or HTML via the i parameter.
Published: 2014-10-01 Multiple SQL injection vulnerabilities in Postfix Admin (aka postfixadmin) before 2.3.5 allow remote authenticated users to execute arbitrary SQL commands via (1) the pw parameter to the pacrypt function, when mysql_encrypt is configured, or (2) unspecified vectors that are used in backup files gene...
Published: 2014-10-01 Cross-site request forgery (CSRF) vulnerability in HP System Management Homepage (SMH) before 7.4 allows remote authenticated users to hijack the authentication of unspecified victims via unknown vectors.