Endpoint

10/19/2018
12:30 PM
John Klossner
John Klossner
Cartoon Contest
100%
0%

Cartoon: Body Metrics

John Klossner has been drawing technology cartoons for more than 15 years. His work regularly appears in Computerworld and Federal Computer Week. His illustrations and cartoons have also been published in The New Yorker, Barron's, and The Wall Street Journal. Web site: ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Page 1 / 2   >   >>
dskquality
50%
50%
dskquality,
User Rank: Apprentice
11/9/2018 | 10:47:58 AM
Re: Check out the latest from John Klossner
You know, at first glance, I liked the idea of wearable tech.. Never through it would be a security risk.
REISEN1955
100%
0%
REISEN1955,
User Rank: Ninja
11/5/2018 | 10:29:47 AM
Re: The Bright Side
Did you really say we'll make the deal or give you the clothes off our back?
PanamaVet
50%
50%
PanamaVet,
User Rank: Strategist
11/5/2018 | 9:07:20 AM
The Bright Side
We were the top site on Insecam yesterday!
TimBerdon
50%
50%
TimBerdon,
User Rank: Apprentice
11/2/2018 | 3:44:58 PM
Scanning
I know that Coverity is expensive, but it now does Firmware, Software, and Underwear scanning.
meonly
50%
50%
meonly,
User Rank: Apprentice
10/31/2018 | 11:50:41 AM
Latest Access Control Security Implementation
You know I always knew our company's security was top-notch but with this latest security measure I think they went to far.
FKREITZBERG980
50%
50%
FKREITZBERG980,
User Rank: Strategist
10/26/2018 | 4:48:02 PM
Smart Home
That was not what I was expecting from a presentation titled "Exposing the Privacy Risk of the Smart Home"
Joe Stanganelli
0%
100%
Joe Stanganelli,
User Rank: Ninja
10/23/2018 | 4:12:35 PM
Re: Check out the latest from John Klossner
There's yet another suggestive joke in there somewhere about the "Something You Do" biometrics factor...
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
10/23/2018 | 10:54:35 AM
Re: Check out the latest from John Klossner
Sam and Rose have taken security tranparency to the next level.
M0nk3
0%
100%
M0nk3,
User Rank: Guru
10/23/2018 | 12:57:00 AM
Just try and relax...
At first I thought; McAfee has gotten a little too literal with their new Endpoint Security implementation.  Now I find it's not a bad way to spend a morning, and it's brought me and the misses closer together.
SXDude
50%
50%
SXDude,
User Rank: Strategist
10/22/2018 | 11:45:35 AM
Vegas Baby
Vegas hotels trail new security measures for 2019 Black Hat event.
Page 1 / 2   >   >>
Microsoft President: Governments Must Cooperate on Cybersecurity
Kelly Sheridan, Staff Editor, Dark Reading,  11/8/2018
Why the CISSP Remains Relevant to Cybersecurity After 28 Years
Steven Paul Romero, SANS Instructor and Sr. SCADA Network Engineer, Chevron,  11/6/2018
5 Reasons Why Threat Intelligence Doesn't Work
Jonathan Zhang, CEO/Founder of WhoisXML API and TIP,  11/7/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Online Malware and Threats: A Profile of Today's Security Posture
Online Malware and Threats: A Profile of Today's Security Posture
This report offers insight on how security professionals plan to invest in cybersecurity, and how they are prioritizing their resources. Find out what your peers have planned today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-19220
PUBLISHED: 2018-11-12
An issue was discovered in LAOBANCMS 2.0. It allows remote attackers to execute arbitrary PHP code via the host parameter to the install/ URI.
CVE-2018-19221
PUBLISHED: 2018-11-12
An issue was discovered in LAOBANCMS 2.0. It allows SQL Injection via the admin/login.php guanliyuan parameter.
CVE-2018-19222
PUBLISHED: 2018-11-12
An issue was discovered in LAOBANCMS 2.0. It allows a /install/mysql_hy.php?riqi=0&i=0 attack to reset the admin password, even if install.txt exists.
CVE-2018-19223
PUBLISHED: 2018-11-12
An issue was discovered in LAOBANCMS 2.0. It allows XSS via the first input field to the admin/type.php?id=1 URI.
CVE-2018-19224
PUBLISHED: 2018-11-12
An issue was discovered in LAOBANCMS 2.0. /admin/login.php allows spoofing of the id and guanliyuan cookies.