Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

9/25/2020
10:00 AM
John Klossner
John Klossner
Cartoon Contest
100%
0%

Cartoon: Identity Crisis

John Klossner has been drawing technology cartoons for more than 15 years. His work regularly appears in Computerworld and Federal Computer Week. His illustrations and cartoons have also been published in The New Yorker, Barron's, and The Wall Street Journal. Web site: ...
View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
utylaconvert
50%
50%
utylaconvert,
User Rank: Apprentice
10/21/2020 | 11:48:28 AM
Re: Cartoon caption
Honey, where did we hide the secret key to recover the MFA codes?
acampbell448
100%
0%
acampbell448,
User Rank: Strategist
10/14/2020 | 9:46:16 AM
Done with Tech!
I'm done with Technology tonight.   The bed won't go up so I'm using pillows, the Kindle is locked up so I'm reading an actual book and I my watch needs charged (again) so I took it off!   Tried to find an analog alarm clock but had sent it to Goodwill a while ago......
rreschly210
100%
0%
rreschly210,
User Rank: Apprentice
10/1/2020 | 1:18:37 PM
Cartoon caption
Sorry, I cannot brush my teeth tonight.  The toothbrush locked me out after three tries.
acampbell448
50%
50%
acampbell448,
User Rank: Strategist
9/28/2020 | 4:35:55 PM
Mask?
Well my facial recognition system didn't recognize you without your mask!
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
9/25/2020 | 1:39:12 PM
Start your weekend with a smile
Check out the latest cartoon from John Klossner! 
COVID-19: Latest Security News & Commentary
Dark Reading Staff 11/19/2020
New Proposed DNS Security Features Released
Kelly Jackson Higgins, Executive Editor at Dark Reading,  11/19/2020
The Yellow Brick Road to Risk Management
Andrew Lowe, Senior Information Security Consultant, TalaTek,  11/19/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: He hits the gong anytime he sees someone click on an email link.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-29070
PUBLISHED: 2020-11-25
osCommerce 2.3.4.1 has XSS vulnerability via the authenticated user entering the XSS payload into the title section of newsletters.
CVE-2020-26212
PUBLISHED: 2020-11-25
GLPI stands for Gestionnaire Libre de Parc Informatique and it is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. In GLPI before version 9.5.3, any authenticated user has read-only permissions to the planning of ever...
CVE-2020-26243
PUBLISHED: 2020-11-25
Nanopb is a small code-size Protocol Buffers implementation. In Nanopb before versions 0.4.4 and 0.3.9.7, decoding specifically formed message can leak memory if dynamic allocation is enabled and an oneof field contains a static submessage that contains a dynamic field, and the message being decoded...
CVE-2020-25650
PUBLISHED: 2020-11-25
A flaw was found in the way the spice-vdagentd daemon handled file transfers from the host system to the virtual machine. Any unprivileged local guest user with access to the UNIX domain socket path `/run/spice-vdagentd/spice-vdagent-sock` could use this flaw to perform a memory denial of service fo...
CVE-2020-29071
PUBLISHED: 2020-11-25
An XSS issue was found in the Shares feature of LiquidFiles before 3.3.19. The issue arises from the insecure rendering of HTML files uploaded to the platform as attachments, when the -htmlview URL is directly accessed. The impact ranges from executing commands as root on the server to retrieving se...