Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cartoon: Spring Fever
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 5 / 6   >   >>
User Rank: Apprentice
6/10/2015 | 7:07:52 AM
Re: nice interesting post
A great illustration of the strange work/life balance that many find themselves in today.
User Rank: Apprentice
6/5/2015 | 4:31:43 AM
nice interesting post
nice interesting post
User Rank: Apprentice
6/3/2015 | 8:33:26 AM
Re: Not sure...
its interesting post
User Rank: Strategist
5/30/2015 | 11:59:28 PM
Not sure...
The blur of modern day work life balance
Joe Stanganelli
Joe Stanganelli,
User Rank: Ninja
5/30/2015 | 11:36:34 PM
Re: Cartoon: Spring Fever
I make up for it by never having fun.  :/
Marilyn Cohodas
Marilyn Cohodas,
User Rank: Strategist
5/29/2015 | 1:14:43 PM
Re: Cartoon: Spring Fever
In my alternate universe I am sitting at my desk, staring out the window while typing on my laptop, imagining myself with a beverage in my hand sitting by the pool in this cartoon. #summercan'tcome soonenough. 
User Rank: Apprentice
5/29/2015 | 4:43:42 AM
Re: Cartoon: Spring Fever
User Rank: Apprentice
5/27/2015 | 7:20:26 AM
Re: Cartoon: Spring Fever
yeah great post
User Rank: Apprentice
5/23/2015 | 3:56:41 AM
Re: Cartoon: Spring Fever
excellent post
User Rank: Apprentice
5/22/2015 | 9:10:46 AM
Re: Cartoon: Spring Fever
haha nice post
<<   <   Page 5 / 6   >   >>

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
Creating an Effective Incident Response Plan
Security teams are realizing their organizations will experience a cyber incident at some point. An effective incident response plan that takes into account their specific requirements and has been tested is critical. This issue of Tech Insights also includes: -a look at the newly signed cyber-incident law, -how organizations can apply behavioral psychology to incident response, -and an overview of the Open Cybersecurity Schema Framework.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2022-11-29
Garage Management System v1.0 is vulnerable to Cross Site Scripting (XSS) via /garage/php_action/createBrand.php.
PUBLISHED: 2022-11-29
An out-of-bounds read flaw was found in the QXL display device emulation in QEMU. The qxl_phys2virt() function does not check the size of the structure pointed to by the guest physical address, potentially reading past the end of the bar space into adjacent pages. A malicious guest user could use th...
PUBLISHED: 2022-11-29
An integer overflow and buffer overflow issues were found in the ACPI Error Record Serialization Table (ERST) device of QEMU in the read_erst_record() and write_erst_record() functions. Both issues may allow the guest to overrun the host buffer allocated for the ERST memory device. A malicious guest...
PUBLISHED: 2022-11-29
Discourse is an open-source discussion platform. Prior to version 2.8.13 of the `stable` branch and version 2.9.0.beta14 of the `beta` and `tests-passed` branches, unauthorized users may learn of the existence of hidden tags and that they have been applied to topics that they have access to. This is...
PUBLISHED: 2022-11-29
The package com.github.samtools:htsjdk before 3.0.1 are vulnerable to Creation of Temporary File in Directory with Insecure Permissions due to the createTempDir() function in util/IOUtil.java not checking for the existence of the temporary directory before attempting to create it.