Vulnerabilities / Threats

4/1/2016
04:00 PM
John Klossner
John Klossner
Cartoon Contest
50%
50%

Name That Toon: It's A Dog's Life

We provide the cartoon. You write the caption.
We provide the cartoon. You write the caption.

Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card. If you don't want to enter a caption, help us pick a winner by voting on the submissions. Click thumbs up for those you find funny. As always, editorial comments are encouraged and welcomed.

Click here for contest rules. For advice on how to beat the competition, check out How To Win A Cartoon Caption Contest. The contest closes May. 2.

John Klossner has been drawing technology cartoons for more than 15 years. His work regularly appears in Computerworld and Federal Computer Week. His illustrations and cartoons have also been published in The New Yorker, Barron's, and The Wall Street Journal. Web site: ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Page 1 / 9   >   >>
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
5/3/2016 | 2:16:16 PM
....and the winning caption is...
robshi
100%
0%
robshi,
User Rank: Strategist
5/3/2016 | 2:10:24 PM
Dog's byte
Don't worry.  His bark is worse than his byte.
mgangal
50%
50%
mgangal,
User Rank: Apprentice
5/3/2016 | 2:08:51 PM
He wanted a smartphone, finally we settled on a laptop
He wanted a smartphone, finally we settled on a laptop
pmueller079
50%
50%
pmueller079,
User Rank: Apprentice
5/3/2016 | 11:03:58 AM
Cartoon Contest
Don't laugh-I have been home so much because Fido is doing so well with his ransomware business, I was able to retire early without any worries
pmueller079
50%
50%
pmueller079,
User Rank: Apprentice
5/3/2016 | 11:02:36 AM
Cartoon Contest
Don't laugh-Fido is doing so well with his ransomware business, I was able to retire without any worries!
Joe Stanganelli
100%
0%
Joe Stanganelli,
User Rank: Ninja
5/2/2016 | 10:59:35 AM
Hello
"He keeps trolling Tumblr by posting 'Yes, this is dog.'"
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
5/2/2016 | 10:39:56 AM
Natural conclusion
"Thanks to Moore's Law, this was cheaper than buying him a squeaky toy."
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
5/1/2016 | 11:22:12 AM
Bandwidth
"At least our data usage is way down since we had him fixed."
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
5/1/2016 | 11:21:05 AM
New Game
"I told him to fetch; now he's ordering a stick off of Amazon."
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
4/30/2016 | 9:35:43 AM
Meme reference
"He has no idea what he's doing."
Page 1 / 9   >   >>
Is Threat Intelligence Garbage?
Chris McDaniels, Chief Information Security Officer of Mosaic451,  5/23/2018
New Mexico Man Sentenced on DDoS, Gun Charges
Dark Reading Staff 5/18/2018
What Israel's Elite Defense Force Unit 8200 Can Teach Security about Diversity
Lital Asher-Dotan, Senior Director, Security Research and Content, Cybereason,  5/21/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Shhh!  They're watching... And you have a laptop?  
Current Issue
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-3018
PUBLISHED: 2018-05-24
The AXIS webapp in deploy-tomcat/axis in IBM Tivoli Application Dependency Discovery Manager (TADDM) 7.1.2 and 7.2.0 through 7.2.1.4 allows remote attackers to obtain sensitive configuration information via a direct request, as demonstrated by happyaxis.jsp. IBM X-Force ID: 84354.
CVE-2013-3023
PUBLISHED: 2018-05-24
IBM Tivoli Application Dependency Discovery Manager (TADDM) 7.1.2 and 7.2.0 through 7.2.1.4 might allow remote attackers to obtain sensitive information about Tomcat credentials by sniffing the network for a session in which HTTP is used. IBM X-Force ID: 84361.
CVE-2013-3024
PUBLISHED: 2018-05-24
IBM WebSphere Application Server (WAS) 8.5 through 8.5.0.2 on UNIX allows local users to gain privileges by leveraging improper process initialization. IBM X-Force ID: 84362.
CVE-2018-5674
PUBLISHED: 2018-05-24
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader before 9.1 and PhantomPDF before 9.1. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw...
CVE-2018-5675
PUBLISHED: 2018-05-24
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader before 9.1 and PhantomPDF before 9.1. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw...