Mobile

11/24/2017
09:00 AM
John Klossner
John Klossner
Cartoon Contest
100%
0%

Name That Toon: 'Tis the Season

We provide the cartoon. You provide the caption.
We provide the cartoon. You provide the caption.

Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card. If you don't want to enter a caption, help us pick a winner by voting on the submissions. Click thumbs up for those you find funny; thumbs down, not so. As always, editorial comments are encouraged and welcomed.

Click here for contest rules. For advice on how to beat the competition, check out How To Win A Cartoon Caption Contest. The contest closes January 2.

John Klossner has been drawing technology cartoons for more than 15 years. His work regularly appears in Computerworld and Federal Computer Week. His illustrations and cartoons have also been published in The New Yorker, Barron's, and The Wall Street Journal. Web site: ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Page 1 / 5   >   >>
kpensacola
0%
100%
kpensacola,
User Rank: Apprentice
1/3/2018 | 1:44:23 PM
My late post
Jingle drones on about nothing as Santa dreams of off-season when nothing elf matters.
cacacloud
0%
100%
cacacloud,
User Rank: Apprentice
1/2/2018 | 11:35:47 AM
Re: Tis the Season
Rolf Harris caught wearing a Santa outfit.
JasonF217
0%
100%
JasonF217,
User Rank: Strategist
1/2/2018 | 11:27:26 AM
Tis the Season
We can make millions packaging a bunch of pieces of crap together into a new product!
Joe Stanganelli
0%
100%
Joe Stanganelli,
User Rank: Ninja
12/31/2017 | 9:56:01 PM
5
"Not bad for a Monday Christmas!"
Joe Stanganelli
0%
100%
Joe Stanganelli,
User Rank: Ninja
12/30/2017 | 10:27:06 PM
4
"On the bright side, I just caught a Mew!"
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
12/30/2017 | 10:24:43 PM
3
"It's the beta version. We'll sell the headsets with the upgrade."
Joe Stanganelli
0%
100%
Joe Stanganelli,
User Rank: Ninja
12/30/2017 | 10:23:52 PM
2
"Mrs. Claus, will you marry me?"
Joe Stanganelli
0%
100%
Joe Stanganelli,
User Rank: Ninja
12/30/2017 | 10:21:53 PM
1
"We'll just make the same assumptions as every other tech company about VR adoption."
abby.ross
0%
100%
abby.ross,
User Rank: Strategist
12/27/2017 | 12:24:44 PM
Hey Santa, Here's your IoT device
Hey Santa, here's your IoT device. Hit this nail to monitor what the elves are doing. Hit this one to track Rudolph and the sleigh. Oh, and don't worry, I set your password. It's "Santa123456."
Mogden24
0%
100%
Mogden24,
User Rank: Guru
12/21/2017 | 3:50:44 PM
Caption Contest
Kim Jong-un and his Wanna Cry hackers won't see this coming. It's magic, Santa. Every time I hammer a nail in, a cybersecurity professional earns a white hat. 
Page 1 / 5   >   >>
WebAuthn, FIDO2 Infuse Browsers, Platforms with Strong Authentication
John Fontana, Standards & Identity Analyst, Yubico,  9/19/2018
NSS Labs Files Antitrust Suit Against Symantec, CrowdStrike, ESET, AMTSO
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/19/2018
Turn the NIST Cybersecurity Framework into Reality: 5 Steps
Mukul Kumar & Anupam Sahai, CISO & VP of Cyber Practice and VP Product Management, Cavirin Systems,  9/20/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Are you sure this is how we get our data into the cloud?
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-14633
PUBLISHED: 2018-09-25
A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The at...
CVE-2018-14647
PUBLISHED: 2018-09-25
Python's elementtree C accelerator failed to initialise Expat's hash salt during initialization. This could make it easy to conduct denial of service attacks against Expat by contructing an XML document that would cause pathological hash collisions in Expat's internal data structures, consuming larg...
CVE-2018-10502
PUBLISHED: 2018-09-24
This vulnerability allows local attackers to escalate privileges on vulnerable installations of Samsung Galaxy Apps Fixed in version 4.2.18.2. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exist...
CVE-2018-11614
PUBLISHED: 2018-09-24
This vulnerability allows remote attackers to escalate privileges on vulnerable installations of Samsung Members Fixed in version 2.4.25. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists wit...
CVE-2018-14318
PUBLISHED: 2018-09-24
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Samsung Galaxy S8 G950FXXU1AQL5. User interaction is required to exploit this vulnerability in that the target must have their cellular radios enabled. The specific flaw exists within the handling of ...