Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

9/13/2019
02:00 PM
John Klossner
John Klossner
Cartoon Contest
100%
0%

Name That Toon: SOC Puppets

We provide the cartoon. You write the caption!
We provide the cartoon. You write the caption!

 
Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card. If you don't want to enter a caption, help us pick a winner by voting on the submissions. Click thumbs-up for those you find funny; thumbs-down, not so. As always, editorial comments are encouraged and welcomed. Click here for contest rules. For advice on how to beat the competition, check out How To Win A Cartoon Caption Contest. The contest closes October 18.

Check out The Edge, Dark Reading's new section for features, threat data, and in-depth perspectives. Today's top story: "Escaping Email: Unlocking Message Security for SMS, WhatsApp."

John Klossner has been drawing technology cartoons for more than 15 years. His work regularly appears in Computerworld and Federal Computer Week. His illustrations and cartoons have also been published in The New Yorker, Barron's, and The Wall Street Journal. Web site: ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 3 / 4   >   >>
thekob96
0%
100%
thekob96,
User Rank: Apprentice
9/25/2019 | 2:24:04 PM
First day on the job
I don't want to alarm you... but being that you are the first female software engineer that our company has hired...?  You might find that there are those within your department who are a little curious about your presence here.
Hazbro
0%
100%
Hazbro,
User Rank: Apprentice
9/22/2019 | 5:13:13 AM
Cartoon Caption Contest
I wish they'd put a sock in it.
vantag
25%
75%
vantag,
User Rank: Apprentice
9/20/2019 | 9:32:19 AM
Re: Write a Caption, Win a Prize
"He's too shy to invite me out face to face!"
jd.daniels
33%
67%
jd.daniels,
User Rank: Apprentice
9/19/2019 | 1:10:29 PM
Creepy
Can we make sure my computer's camera is off? I feel like I am being watched.
kratiw
0%
100%
kratiw,
User Rank: Strategist
9/19/2019 | 10:10:10 AM
Legal!
I don't think legal is taking our concerns about identity theft seriously.
Tempest2004
0%
100%
Tempest2004,
User Rank: Ninja
9/18/2019 | 4:12:33 PM
sock puppets
Because Sock Puppets don't get fired for being brutally honest describing the weaknesses of existing security controls.
REISEN1955
0%
100%
REISEN1955,
User Rank: Ninja
9/18/2019 | 12:47:49 PM
Re: shallow fake
It was only then that Sam realized his friend had taken private messaging to a whole new level. 
Deadsnott
0%
100%
Deadsnott,
User Rank: Guru
9/18/2019 | 9:44:24 AM
SOCKS puppets
I think he may have misunderstood when I suggested using a SOCKS proxy to bypass the firewall.
Tempest2004
0%
100%
Tempest2004,
User Rank: Ninja
9/17/2019 | 5:27:52 PM
sock puppets
Fred's sock puppets could have frank security conversations with management without the risk of being fired.
Tempest2004
0%
100%
Tempest2004,
User Rank: Ninja
9/17/2019 | 5:11:24 PM
sock puppets
Fred has learned that his co-works were more likely to listen to security threat diatribes from his sock puppets.
<<   <   Page 3 / 4   >   >>
For Cybersecurity to Be Proactive, Terrains Must Be Mapped
Craig Harber, Chief Technology Officer at Fidelis Cybersecurity,  10/8/2019
A Realistic Threat Model for the Masses
Lysa Myers, Security Researcher, ESET,  10/9/2019
USB Drive Security Still Lags
Dark Reading Staff 10/9/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-17537
PUBLISHED: 2019-10-13
Jiangnan Online Judge (aka jnoj) 0.8.0 has Directory Traversal for file deletion via the web/polygon/problem/deletefile?id=1&amp;name=../ substring.
CVE-2019-17538
PUBLISHED: 2019-10-13
Jiangnan Online Judge (aka jnoj) 0.8.0 has Directory Traversal for file reading via the web/polygon/problem/viewfile?id=1&amp;name=../ substring.
CVE-2019-17535
PUBLISHED: 2019-10-13
Gila CMS through 1.11.4 allows blog-list.php XSS, in both the gila-blog and gila-mag themes, via the search parameter, a related issue to CVE-2019-9647.
CVE-2019-17536
PUBLISHED: 2019-10-13
Gila CMS through 1.11.4 allows Unrestricted Upload of a File with a Dangerous Type via the moveAction function in core/controllers/fm.php. The attacker needs to use admin/media_upload and fm/move.
CVE-2019-17533
PUBLISHED: 2019-10-13
Mat_VarReadNextInfo4 in mat4.c in MATIO 1.5.17 omits a certain '\0' character, leading to a heap-based buffer over-read in strdup_vprintf when uninitialized memory is accessed.