Operations // Identity & Access Management
12/11/2013
11:06 AM
John Klossner
John Klossner
Commentary
50%
50%

Name That Toon, Win a Prize

We provide the cartoon. You write the caption.
We provide the cartoon. You write the caption.

Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card. If you don't want to enter a caption, help us pick a winner by voting on the submissions. Click thumbs up for those you find funny. As always, editorial comments are encouraged and welcomed.

Click here for contest rules. For advice on how to beat the competition, check out How To Win A Cartoon Caption Contest (Tech Version) . The contest closes Jan. 5.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 2 / 10   >   >>
The Penguin
50%
50%
The Penguin,
User Rank: Apprentice
12/20/2013 | 4:54:25 PM
Name That Toon
Until he's ID'd, he's just another perp.
The Penguin
50%
50%
The Penguin,
User Rank: Apprentice
12/20/2013 | 4:52:56 PM
Name That Toon
I don't want to get a Fauxlex.
dw_ship
100%
0%
dw_ship,
User Rank: Apprentice
12/19/2013 | 3:16:34 PM
The Night Before Christmas
How did the rolls get reversed? I thought the kids were supposed to be dreaming of sugar plums while the parents stayed up.
dw_ship
100%
0%
dw_ship,
User Rank: Apprentice
12/19/2013 | 10:45:18 AM
S.A.N.T.A.
We're a test home for his new Secure Assist Navigation and Tracking Application
dw_ship
100%
0%
dw_ship,
User Rank: Apprentice
12/19/2013 | 10:33:36 AM
GPS Backup
It helps the North Pole track him, in case he loses his phone.
dw_ship
100%
0%
dw_ship,
User Rank: Apprentice
12/19/2013 | 10:32:50 AM
Santa Inventory
It slows down the process, but he doesn't make mistakes anymore.
Booberry
50%
50%
Booberry,
User Rank: Apprentice
12/18/2013 | 9:58:17 PM
Name That Toon
Call 911...Grandma got ran over by a reindeer.
Booberry
50%
50%
Booberry,
User Rank: Apprentice
12/18/2013 | 9:47:04 PM
Name That Toon
There's an Army of these guys out there.
Booberry
50%
50%
Booberry,
User Rank: Apprentice
12/18/2013 | 9:45:43 PM
Name That Toon
This security system came out in the Nick of time.
Booberry
50%
50%
Booberry,
User Rank: Apprentice
12/18/2013 | 9:33:17 PM
Name That Toon
Where's the Amazon drones?
<<   <   Page 2 / 10   >   >>
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-7896
Published: 2015-03-03
Multiple cross-site scripting (XSS) vulnerabilities in HP XP P9000 Command View Advanced Edition Software Online Help, as used in HP Device Manager 6.x through 8.x before 8.1.2-00, HP XP P9000 Tiered Storage Manager 6.x through 8.x before 8.1.2-00, HP XP P9000 Replication Manager 6.x and 7.x before ...

CVE-2014-9283
Published: 2015-03-03
The BestWebSoft Captcha plugin before 4.0.7 for WordPress allows remote attackers to bypass the CAPTCHA protection mechanism and obtain administrative access via unspecified vectors.

CVE-2014-9683
Published: 2015-03-03
Off-by-one error in the ecryptfs_decode_from_filename function in fs/ecryptfs/crypto.c in the eCryptfs subsystem in the Linux kernel before 3.18.2 allows local users to cause a denial of service (buffer overflow and system crash) or possibly gain privileges via a crafted filename.

CVE-2015-0656
Published: 2015-03-03
Cross-site scripting (XSS) vulnerability in the login page in Cisco Network Analysis Module (NAM) allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka Bug ID CSCum81269.

CVE-2015-0890
Published: 2015-03-03
The BestWebSoft Google Captcha (aka reCAPTCHA) plugin before 1.13 for WordPress allows remote attackers to bypass the CAPTCHA protection mechanism and obtain administrative access via unspecified vectors.

Dark Reading Radio
Archived Dark Reading Radio
How can security professionals better engage with their peers, both in person and online? In this Dark Reading Radio show, we will talk to leaders at some of the security industry’s professional organizations about how security pros can get more involved – with their colleagues in the same industry, with their peers in other industries, and with the IT security community as a whole.