Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

End of Bibblio RCM includes -->
2/15/2021
10:00 AM
John Klossner
John Klossner
Cartoon Contest

Name That Toon: Gather 'Round the Campfire

We didn't start the fire, but we're sure it'll spark some ideas for our February cartoon caption contest. Come up with something clever, submit it in the comments (below), and our panel of experts will reward the winner with a $25 Amazon gift card. 

Here's the cartoon:

If you don't want to enter a caption, help us pick a winning caption by voting on the submissions. Click thumbs-up for those you find funny; thumbs-down, not so. 

The contest ends Thursday, March 4, 2021. Good luck!

 

John Klossner has been drawing technology cartoons for more than 15 years. His work regularly appears in Computerworld and Federal Computer Week. His illustrations and cartoons have also been published in The New Yorker, Barron's, and The Wall Street Journal. Web site: ... View Full Bio

Comment  | 
Print  | 
More Insights
//Comments
Newest First  |  Oldest First  |  Threaded View
Page 1 / 4   >   >>
xpaulg
xpaulg,
User Rank: Apprentice
3/9/2021 | 2:03:13 PM
I'm bored
Fancy getting stoned tonight?
xpaulg
xpaulg,
User Rank: Apprentice
3/9/2021 | 1:55:16 PM
Its so convenient
Yeah we just stopped hunting and gathering, - with the kids we just dont have the time any more.  We usually just order pizza.
xpaulg
xpaulg,
User Rank: Apprentice
3/9/2021 | 1:49:38 PM
Bright spark
I keep telling him, it's the Paleolithic era, - our big chance to finally get off the grid!  But no, he can't live without facebook.
acampbell448
acampbell448,
User Rank: Ninja
3/9/2021 | 9:31:32 AM
Bedrock Hub
Wow - look at what you can get delivered at the new Amazon Hub in Bedrock!    A Firestick, some iRocks and a something called a laptop that is way better than the Tablet we have been using.....
acampbell448
acampbell448,
User Rank: Ninja
3/8/2021 | 9:45:02 AM
Starlink!
Ever since he got that Starlink Beta kit he doesn't want to talk to us anymore.......
Tempest2004
Tempest2004,
User Rank: Strategist
3/5/2021 | 10:12:50 PM
Post Technology Age
George has not accepted that the technology age has come to an end.
pmauriks
pmauriks,
User Rank: Strategist
3/5/2021 | 1:24:01 AM
Name that Toon: Gather Round the campfire caption.
Lexi's just checking the fire meets specifications for this years PCI-DinoSS assessment.
boyetje
boyetje,
User Rank: Strategist
3/4/2021 | 12:23:04 PM
Name that toon
Sure you have fire, but he has an i7!
dasdboot
dasdboot,
User Rank: Apprentice
3/3/2021 | 10:19:15 PM
Name That Toon: Gather 'Round the Campfire
Poor Alfie, still clinging to his cryptowallet...
ChadF3
ChadF3,
User Rank: Strategist
3/3/2021 | 2:08:57 PM
Old Tech is Simpler
Your new device is too complex. Me stick with iWheel.
Page 1 / 4   >   >>
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Machine Learning, AI & Deep Learning Improve Cybersecurity
Machine intelligence is influencing all aspects of cybersecurity. Organizations are implementing AI-based security to analyze event data using ML models that identify attack patterns and increase automation. Before security teams can take advantage of AI and ML tools, they need to know what is possible. This report covers: -How to assess the vendor's AI/ML claims -Defining success criteria for AI/ML implementations -Challenges when implementing AI
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-40923
PUBLISHED: 2022-09-30
A vulnerability in the LIEF::MachO::SegmentCommand::virtual_address function of LIEF v0.12.1 allows attackers to cause a denial of service (DOS) through a segmentation fault via a crafted MachO file.
CVE-2022-40943
PUBLISHED: 2022-09-30
Dairy Farm Shop Management System 1.0 is vulnerable to SQL Injection via bwdate-report-ds.php file.
CVE-2022-35155
PUBLISHED: 2022-09-30
Bus Pass Management System v1.0 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the searchdata parameter.
CVE-2022-35156
PUBLISHED: 2022-09-30
Bus Pass Management System 1.0 was discovered to contain a SQL Injection vulnerability via the searchdata parameter at /buspassms/download-pass.php..
CVE-2022-40341
PUBLISHED: 2022-09-30
mojoPortal v2.7 was discovered to contain an arbitrary file upload vulnerability which allows attackers to execute arbitrary code via a crafted PNG file.