Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


End of Bibblio RCM includes -->
01:45 PM
John Klossner
John Klossner
Cartoon Contest

Name That Toon: Who Needs Pokemon Go?

We provide the cartoon. You write the caption.
We provide the cartoon. You write the caption.

Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card. If you don't want to enter a caption, help us pick a winner by voting on the submissions. Click thumbs up for those you find funny. As always, editorial comments are encouraged and welcomed.

Click here for contest rules. For advice on how to beat the competition, check out How To Win A Cartoon Caption Contest. The contest closes August 15.

John Klossner has been drawing technology cartoons for more than 15 years. His work regularly appears in Computerworld and Federal Computer Week. His illustrations and cartoons have also been published in The New Yorker, Barron's, and The Wall Street Journal. Web site: ... View Full Bio

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Page 1 / 8   >   >>
User Rank: Strategist
8/11/2017 | 8:21:55 AM
Who Needs Pokemon Go?
"Yeah, we're working out the haptics for PGA Tour Caddie VR right now. Should be pretty sweet."
Marilyn Cohodas
Marilyn Cohodas,
User Rank: Strategist
8/12/2016 | 8:12:56 AM
Winners to be announced today!
Stay tuned!
User Rank: Apprentice
8/11/2016 | 11:42:36 AM
Name That Toon:
The transition from telework, back to the office, is harder for some people than others.
User Rank: Apprentice
8/11/2016 | 9:55:23 AM
Phil Mickleson on an offday
Is that Phil Mickleson daytrading again?
User Rank: Apprentice
8/11/2016 | 7:35:45 AM
Bill, Did you find good password for your site??

User Rank: Strategist
8/9/2016 | 3:35:02 PM
Name that Toon
"Hey Bill, did you get the report from our vulnerability scan?"

"Yep. Looking at the holes as we speak."
User Rank: Apprentice
8/9/2016 | 12:42:26 PM
Re: A new caption contest!
"I'm HFW today: homing from work."
User Rank: Apprentice
8/9/2016 | 11:03:19 AM
Name that TOON
Hey, can I borrow your password real quick?  i have got to get to the company golf tournament.
Joe Stanganelli
Joe Stanganelli,
User Rank: Ninja
8/9/2016 | 6:26:04 AM
"HR won't let me play Doom anymore."
Joe Stanganelli
Joe Stanganelli,
User Rank: Ninja
8/9/2016 | 6:22:56 AM
"When you're testing a game, you've really got to get into the mind of the user."
Page 1 / 8   >   >>
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
Practical Network Security Approaches for a Multicloud, Hybrid IT World
The report covers areas enterprises should focus on for their multicloud/hybrid cloud security strategy: -increase visibility over the environment -learning cloud-specific skills -relying on established security frameworks -re-architecting the network
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2022-05-09
RARLAB UnRAR before 6.12 on Linux and UNIX allows directory traversal to write to files during an extract (aka unpack) operation, as demonstrated by creating a ~/.ssh/authorized_keys file. NOTE: WinRAR and Android RAR are unaffected.
PUBLISHED: 2022-05-09
In Solana rBPF versions 0.2.26 and 0.2.27 are affected by Incorrect Calculation which is caused by improper implementation of sdiv instruction. This can lead to the wrong execution path, resulting in huge loss in specific cases. For example, the result of a sdiv instruction may decide whether to tra...
PUBLISHED: 2022-05-08
ImageMagick 7.1.0-27 is vulnerable to Buffer Overflow.
PUBLISHED: 2022-05-08
marcador package in PyPI 0.1 through 0.13 included a code-execution backdoor.
PUBLISHED: 2022-05-08
NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 in GitHub repository vim/vim prior to 8.2.4901. NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 allows attackers to cause a denial of service (application crash) via a crafted input.