Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

11/11/2019
02:00 PM
John Klossner
John Klossner
Cartoon Contest
50%
50%

Name That Toon: Endpoint Protection

We provide the cartoon. You write the caption!
We provide the cartoon. You write the caption!

Submit your caption in the comments and our panel of experts will reward the winner with a $25 Amazon gift card. If you don't want to enter a caption, help us pick a winner by voting on the submissions. Click thumbs-up for those you find funny; thumbs-down, not so. As always, editorial comments are encouraged and welcomed. Click here for contest rules. For advice on how to beat the competition, check out How To Win A Cartoon Caption Contest. The contest closes December 13.

Related Content:

Check out The Edge, Dark Reading's new section for features, threat data, and in-depth perspectives. Today's top story: 4 Ways to Soothe a Stressed-Out Incident Response Team

John Klossner has been drawing technology cartoons for more than 15 years. His work regularly appears in Computerworld and Federal Computer Week. His illustrations and cartoons have also been published in The New Yorker, Barron's, and The Wall Street Journal. Web site: ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
techstar55
0%
100%
techstar55,
User Rank: Guru
11/11/2019 | 2:49:31 PM
Dueling Free Throws
Dueling Free Throws

A riff on the song Dueling Banjos
techstar55
0%
100%
techstar55,
User Rank: Guru
11/11/2019 | 2:53:06 PM
Dueling Free Throws
Dueling Free Throws

A riff on the song Dueling Banjos
techstar55
0%
100%
techstar55,
User Rank: Guru
11/11/2019 | 2:54:32 PM
Dueling Free Throws
Dueling Free Throws

A riff on the song Dueling Banjos
ragraham
0%
100%
ragraham,
User Rank: Apprentice
11/11/2019 | 9:06:28 PM
Offensive Security
Offensive Security
Jan@eskenzipr.com
17%
83%
[email protected],
User Rank: Apprentice
11/12/2019 | 6:52:54 AM
Cartoon Caption
How do you like our new spear phishing email solution?
kancell
17%
83%
kancell,
User Rank: Apprentice
11/12/2019 | 9:59:07 AM
Cartoon Caption
Did you want spear phishing? Trojan horse? Or all of the above?
Blaze007
50%
50%
Blaze007,
User Rank: Strategist
11/12/2019 | 10:25:25 AM
Name That Toon Caption
"IT told me that once they build a moat around my workstation, I'll finally get rid of this nasty Trojan."
HPERPER
0%
100%
HPERPER,
User Rank: Strategist
11/12/2019 | 12:41:45 PM
Endpoint Protection Toon
We heard about a white horse.  I think thats Frank's kid with a sheet over the family dog.
Dredger23
33%
67%
Dredger23,
User Rank: Strategist
11/13/2019 | 10:06:40 AM
Roleplay as an attacker
I think Bob has taken "Roleplay as an attacker", to a all new high...
blightsey3921
0%
100%
blightsey3921,
User Rank: Strategist
11/14/2019 | 11:46:30 AM
office romance
I thought the "Knight in Shining Armor" was Tracie's latest office romance!
marshalljohns
40%
60%
marshalljohns,
User Rank: Apprentice
11/14/2019 | 11:48:31 AM
End Point Protection Toon
"Now go away or I will taunt you a second time"
abbyross
0%
100%
abbyross,
User Rank: Strategist
11/14/2019 | 11:51:53 AM
Call the police!
"Call the police! This pen tester is breaking into our computers!"

"Uh, you know you hired him to do a pen test, right? And he has a contract."
jimlh
33%
67%
jimlh,
User Rank: Apprentice
11/14/2019 | 12:04:15 PM
Tilting at windmills
Looks like Don is trying to convince the CFO to increase our cybersecurity budget, again.
cmgreenjr1
20%
80%
cmgreenjr1,
User Rank: Apprentice
11/14/2019 | 4:11:36 PM
Name that toon
"Looks like the Trojans are evolving into a more focused attack mode."
abigailb
17%
83%
abigailb,
User Rank: Strategist
11/18/2019 | 2:25:38 PM
Endpoint Protection
So you just give this guy the password to access your desk
scottdutton@centurytel.net
33%
67%
[email protected],
User Rank: Apprentice
11/18/2019 | 3:09:52 PM
Cartoon Caption
We wanted the Cyber Ninjas, but this was the best we could find.
paustinnew
50%
50%
paustinnew,
User Rank: Apprentice
11/18/2019 | 5:17:14 PM
Tilting at windmills
Is this a new type of spear phishing?
2huka
25%
75%
2huka,
User Rank: Strategist
11/21/2019 | 1:07:41 PM
Dream the Impossible Dream
'Look, our very own Don Quixote!  If only his chivalrous attempt could twart the ransom, we'd be spared the media coverage.'
InfoSec Overnights
50%
50%
InfoSec Overnights,
User Rank: Apprentice
11/19/2019 | 5:16:36 AM
Caption
I don't think he understands "spearphishing."
kratiw
25%
75%
kratiw,
User Rank: Strategist
11/19/2019 | 7:58:43 AM
Red Team
Someone on the red team is taking things too litteraly.
BrianR603
25%
75%
BrianR603,
User Rank: Apprentice
11/19/2019 | 9:02:28 AM
End Point Protection
"Looks like the new security solution they brought in keeps charging our accounts"
suliano
71%
29%
suliano,
User Rank: Apprentice
11/19/2019 | 1:21:02 PM
su
-when I told you that our cyber-defense was from another age
rslay99
67%
33%
rslay99,
User Rank: Apprentice
11/20/2019 | 5:20:14 PM
Medieval Kingdom Security
"Must have been another Bud Light Platinum night at Joe's, He's trying to protect the office with Medieval Kingdom Security again!"
rainforestpress
50%
50%
rainforestpress,
User Rank: Strategist
11/20/2019 | 7:11:31 PM
Knight Shift
He said the knight shift was the pointy end of the cyber-security spear.

 
markgrogan
50%
50%
markgrogan,
User Rank: Strategist
11/27/2019 | 2:21:55 AM
Re: Knight Shift
I really think he is stuck in old ways of thinking.
acampbell448
40%
60%
acampbell448,
User Rank: Strategist
11/21/2019 | 9:31:33 AM
White Knight?
Managment said they were looking for a White Knight to save us but I don't think this is what they meant!
rockclimber510
25%
75%
rockclimber510,
User Rank: Apprentice
11/21/2019 | 10:01:50 AM
Giants In Disguise
Microsoft's Lock Screen apparently looked a little too real on Don's new 8K screen.
rockclimber510
33%
67%
rockclimber510,
User Rank: Apprentice
11/21/2019 | 10:03:58 AM
Giant Problem
When Don's computer got infected with ransomware, he knew he had a giant problem he had to fight.
dmisk.2019
25%
75%
dmisk.2019,
User Rank: Apprentice
11/22/2019 | 9:39:02 AM
Cyber Awareness
"I think this year's Cybersecurity Awareness Campaign is too much!  I'll clean up after a cyber incident, but I will not clean up after a horse incident." 

 
gicad
33%
67%
gicad,
User Rank: Apprentice
11/25/2019 | 8:05:56 AM
Technology evolution

Let's hope this time, the Insanity Knight will succeed, with his traditional old approach, to save us.

 

DANDREN554
33%
67%
DANDREN554,
User Rank: Strategist
11/25/2019 | 11:17:13 AM
from the ministry of silly cyber offense
We are no longer the knights who say SPAMALOT! We are now the knights who say dilly dilly trojan horse!
mikeoke_2k4
50%
50%
mikeoke_2k4,
User Rank: Strategist
11/26/2019 | 8:39:52 AM
Endpoint Protection
Bob's taking this "one man crusade against phishing" a little too far...
kratiw
50%
50%
kratiw,
User Rank: Strategist
11/26/2019 | 11:30:27 AM
Old idiom, new technology
Tilting at Windows
Lomax6996
0%
100%
Lomax6996,
User Rank: Apprentice
11/27/2019 | 9:22:00 AM
Name That Toon: Endpoint Protection
"Find out who hired this new Pen Tester!"
steve@tvstrategies.com
0%
100%
[email protected],
User Rank: Apprentice
11/27/2019 | 2:26:57 PM
Re: Name That Toon: Endpoint Protection
"This is nothing - he does Civil War re-enactments on weekends!"
bobhobbit
0%
100%
bobhobbit,
User Rank: Guru
12/19/2019 | 11:29:37 AM
Re: Name That Toon: Endpoint Protection
Germs Shmerms ! I don't care what you say this new guy has serious touchscreen issues.
bobhobbit
0%
100%
bobhobbit,
User Rank: Guru
12/19/2019 | 11:30:30 AM
Re: Name That Toon: Endpoint Protection
Germs Shmerms ! I don't care what you say this new guy has serious touchscreen issues.
WallyDragon
33%
67%
WallyDragon,
User Rank: Strategist
11/29/2019 | 9:01:37 AM
Endpoint Protection
Looks like our "Last Line of defence" process needs a little more work...
EJ Carroll
0%
100%
EJ Carroll,
User Rank: Strategist
12/2/2019 | 9:26:15 AM
Endpoint
"I tried to tell him that it's not "knight" mode, but he wouldn't listen."
matthewkmiller
67%
33%
matthewkmiller,
User Rank: Strategist
12/2/2019 | 11:47:54 AM
Medieval
When I heard him say he was about to get medieval on the malicious actors, I didn't take him literally.
ey3432
50%
50%
ey3432,
User Rank: Apprentice
12/2/2019 | 5:58:45 PM
pen test
"When corporate said they were hiring a new penetration tester, I was definitely not expecting this."
mehulpruthi
50%
50%
mehulpruthi,
User Rank: Apprentice
12/5/2019 | 2:02:56 AM
Cartoon Contest
Desktop: My enemies think they can destroy my data. These noobs are unaware of desktop virtualization.
TonyA940
50%
50%
TonyA940,
User Rank: Author
12/5/2019 | 2:10:26 PM
"The security team seem to be taking SiegeWare seriously"
"The security team seem to be taking SiegeWare seriously" 
firozb
0%
100%
firozb,
User Rank: Apprentice
12/6/2019 | 12:30:30 AM
Spear phishing campaigns
When I requested protection from spear phishing campaigns, I didn't quite expect this.
PajamaSam
50%
50%
PajamaSam,
User Rank: Strategist
12/9/2019 | 3:19:51 PM
Name That Toon
"This is the last time we hire Game of Thrones Security"
bhymer
50%
50%
bhymer,
User Rank: Apprentice
12/10/2019 | 4:17:34 AM
Name that Tune
Our Endpoint Protection system is a little outdated... 
44% of Security Threats Start in the Cloud
Kelly Sheridan, Staff Editor, Dark Reading,  2/19/2020
Zero-Factor Authentication: Owning Our Data
Nick Selby, Chief Security Officer at Paxos Trust Company,  2/19/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
How Enterprises Are Developing and Maintaining Secure Applications
How Enterprises Are Developing and Maintaining Secure Applications
The concept of application security is well known, but application security testing and remediation processes remain unbalanced. Most organizations are confident in their approach to AppSec, although others seem to have no approach at all. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-5162
PUBLISHED: 2020-02-25
An exploitable improper access control vulnerability exists in the iw_webs account settings functionality of the Moxa AWK-3131A firmware version 1.13. A specially crafted user name entry can cause the overwrite of an existing user account password, resulting in remote shell access to the device as t...
CVE-2019-5165
PUBLISHED: 2020-02-25
An exploitable authentication bypass vulnerability exists in the hostname processing of the Moxa AWK-3131A firmware version 1.13. A specially configured device hostname can cause the device to interpret select remote traffic as local traffic, resulting in a bypass of web authentication. An attacker ...
CVE-2020-9383
PUBLISHED: 2020-02-25
An issue was discovered in the Linux kernel through 5.5.6. set_fdc in drivers/block/floppy.c leads to a wait_til_ready out-of-bounds read because the FDC index is not checked for errors before assigning it, aka CID-2e90ca68b0d2.
CVE-2019-5136
PUBLISHED: 2020-02-25
An exploitable privilege escalation vulnerability exists in the iw_console functionality of the Moxa AWK-3131A firmware version 1.13. A specially crafted menu selection string can cause an escape from the restricted console, resulting in system access as the root user. An attacker can send commands ...
CVE-2019-5137
PUBLISHED: 2020-02-25
The usage of hard-coded cryptographic keys within the ServiceAgent binary allows for the decryption of captured traffic across the network from or to the Moxa AWK-3131A firmware version 1.13.