Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Strong Passwords
Newest First  |  Oldest First  |  Threaded View
Comenclater
50%
50%
Comenclater,
User Rank: Apprentice
5/21/2014 | 5:51:03 PM
Re: Ah!
I use password manager Sticky Password (http://blogen.stickypassword.com/creating-strong-passwords-with-sticky-password/) . It acilitates my life.
rhartung528
50%
50%
rhartung528,
User Rank: Apprentice
4/8/2014 | 1:08:47 PM
Ah!
So how long can it take to enter your password?
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
4/7/2014 | 12:24:32 PM
Re: Almost too good...
Very funny @BurnsieUK! :-)
BurnsieUK
50%
50%
BurnsieUK,
User Rank: Apprentice
4/7/2014 | 11:37:22 AM
Re: Almost too good...
By the time we need to decode them a computer the size of a planet will be able to do it in an instant.

 
Sara Peters
100%
0%
Sara Peters,
User Rank: Author
3/26/2014 | 8:58:05 PM
Almost too good...
Hahahaaaa. Hilarious. It does make me wonder though... how much of today will be forever lost to history, because wonderful security and/or speedy obsolescence of digital media will render most of life indecipherable?
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
3/26/2014 | 8:54:46 PM
Love the cartoon!
Nice touch. Are those glyphs encrypted?


COVID-19: Latest Security News & Commentary
Dark Reading Staff 6/1/2020
Stay-at-Home Orders Coincide With Massive DNS Surge
Robert Lemos, Contributing Writer,  5/27/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: I don't think this suit works!  Your deodorant is killing me.
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-4019
PUBLISHED: 2020-06-01
The file editing functionality in the Atlassian Companion App before version 1.0.0 allows local attackers to have the app run a different executable in place of the app's cmd.exe via a untrusted search path vulnerability.
CVE-2020-4020
PUBLISHED: 2020-06-01
The file downloading functionality in the Atlassian Companion App before version 1.0.0 allows remote attackers, who control a Confluence Server instance that the Companion App is connected to, execute arbitrary .exe files via a Protection Mechanism Failure.
CVE-2020-4021
PUBLISHED: 2020-06-01
Affected versions are: Before 8.5.5, and from 8.6.0 before 8.8.1 of Atlassian Jira Server and Data Center allow remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the XML export view.
CVE-2020-4023
PUBLISHED: 2020-06-01
The review coverage resource in Atlassian Fisheye and Crucible before version 4.8.2 allows remote attackers to inject arbitrary HTML or Javascript via a cross site scripting (XSS) vulnerability through the committerFilter parameter.
CVE-2020-4013
PUBLISHED: 2020-06-01
The review resource in Atlassian Fisheye and Crucible before version 4.8.1 allows remote attackers to inject arbitrary HTML or Javascript via a cross site scripting (XSS) vulnerability through the review objectives.