IoT
6/16/2016
02:00 PM
John Klossner
John Klossner
Cartoon Contest
50%
50%

Cartoon: Internet of Things Meets Tech Support

John Klossner has been drawing technology cartoons for more than 15 years. His work regularly appears in Computerworld and Federal Computer Week. His illustrations and cartoons have also been published in The New Yorker, Barron's, and The Wall Street Journal. Web site: ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Alex21paul
50%
50%
Alex21paul,
User Rank: Apprentice
1/25/2018 | 2:50:08 AM
re
John Klossner's works are hilarious and I think he has done enough homework before creating these cartoons. The one that is showcased here is hilarious one and I really couldn't stop laughing.

Related Site
Kylenmackey
50%
50%
Kylenmackey,
User Rank: Apprentice
7/10/2016 | 3:11:53 AM
cartoon
NICE POST dis
drmrs
50%
50%
drmrs,
User Rank: Strategist
7/6/2016 | 11:41:10 AM
Cartoon Caption Contest (July 2016)
Would you like to borrow my owner's manuel and a flashlight? Or, you can start replacing parts like the other mechanics!
kensavage
50%
50%
kensavage,
User Rank: Apprentice
6/29/2016 | 11:45:02 AM
sure but...
I can't get my kid's jr high school to teach modern science.  Coding it lightyears away for his school district. Glad there's Code.org
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
6/24/2016 | 11:07:18 AM
Re: IoT meets Tech Support
We are quickly approaching a society in which almost everyone, regardless of profession, would do well to know how to code.
Mejo Thomas
100%
0%
Mejo Thomas,
User Rank: Apprentice
6/23/2016 | 11:53:58 PM
Cartoon
Found the problem, it is with the physical layer
pmueller079
50%
50%
pmueller079,
User Rank: Apprentice
6/22/2016 | 12:30:50 PM
Cartoon
It keeps accelerating--Think I got hacked?
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
6/16/2016 | 3:53:29 PM
IoT meets Tech Support
A trip back to the future! Hysterical new cartoon...
Want Your Daughter to Succeed in Cyber? Call Her John
John De Santis, CEO, HyTrust,  5/16/2018
Don't Roll the Dice When Prioritizing Vulnerability Fixes
Ericka Chickowski, Contributing Writer, Dark Reading,  5/15/2018
New Mexico Man Sentenced on DDoS, Gun Charges
Dark Reading Staff 5/18/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "Security through obscurity"
Current Issue
Flash Poll
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
Enterprises are spending more of their IT budgets on cybersecurity technology. How do your organization's security plans and strategies compare to what others are doing? Here's an in-depth look.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-2607
PUBLISHED: 2018-05-21
jenkins before versions 2.44, 2.32.2 is vulnerable to a persisted cross-site scripting vulnerability in console notes (SECURITY-382). Jenkins allows plugins to annotate build logs, adding new content or changing the presentation of existing content while the build is running. Malicious Jenkins users...
CVE-2018-1108
PUBLISHED: 2018-05-21
kernel drivers before version 4.17-rc1 are vulnerable to a weakness in the Linux kernel's implementation of random seed data. Programs, early in the boot sequence, could use the data allocated for the seed before it was sufficiently generated.
CVE-2018-11330
PUBLISHED: 2018-05-21
An issue was discovered in Pluck before 4.7.6. There is authenticated stored XSS because the character set for filenames is not properly restricted.
CVE-2018-11331
PUBLISHED: 2018-05-21
An issue was discovered in Pluck before 4.7.6. Remote PHP code execution is possible because the set of disallowed filetypes for uploads in missing some applicable ones such as .phtml and .htaccess.
CVE-2018-7687
PUBLISHED: 2018-05-21
The Micro Focus Client for OES before version 2 SP4 IR8a has a vulnerability that could allow a local attacker to elevate privileges via a buffer overflow in ncfsd.sys.