Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Write A Caption & Win A Prize
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 8 / 14   >   >>
RyanSepe
0%
100%
RyanSepe,
User Rank: Ninja
2/22/2016 | 12:22:55 PM
Soft Token
"I had something else in mind when you told me we were getting soft tokens."
rbeaman800
0%
100%
rbeaman800,
User Rank: Apprentice
2/22/2016 | 11:48:12 AM
write a caption password security
" ..well you told me not to write it down!  so i keep it on my facebook page, and it's private, right?!"
MaciejJustat
0%
100%
MaciejJustat,
User Rank: Apprentice
2/22/2016 | 10:59:04 AM
Cartoon Caption
"These automated password resets are getting out of hand."
mikegresham
20%
80%
mikegresham,
User Rank: Apprentice
2/22/2016 | 10:17:02 AM
Caption
I should have known better than breaking up with an IT Professional with a pilots license!
flemingi
0%
100%
flemingi,
User Rank: Apprentice
2/21/2016 | 8:32:13 PM
Now that I have LifeLock, I know that my password is so much more secure.
Now that I have LifeLock, I know that my password is so much more secure.
snowbiz2016
50%
50%
snowbiz2016,
User Rank: Apprentice
2/21/2016 | 4:58:14 PM
cartoon caption
I just dont understand why mangement is spending real money and time on somethingn they call " 2 factor authentication" ...its not like our 4 character passwords are weak or avialble to just anyone.
Steelheadcase
40%
60%
Steelheadcase,
User Rank: Apprentice
2/21/2016 | 3:10:51 PM
Caption post
"So Bob, how's that 'Meet Smoking Hot Russian Women' dating site working out?"
Joe Stanganelli
56%
44%
Joe Stanganelli,
User Rank: Ninja
2/21/2016 | 11:08:12 AM
Caption try #3
"I'm glad to see you're no longer keeping sticky notes on your monitor, Ed."
Joe Stanganelli
20%
80%
Joe Stanganelli,
User Rank: Ninja
2/20/2016 | 8:06:04 PM
Caption try #2
"Jim, my eyes are up here."
Joe Stanganelli
0%
100%
Joe Stanganelli,
User Rank: Ninja
2/20/2016 | 8:00:29 PM
Caption try
The pen testers are charging way too much for overhead.
<<   <   Page 8 / 14   >   >>


COVID-19: Latest Security News & Commentary
Dark Reading Staff 6/1/2020
Stay-at-Home Orders Coincide With Massive DNS Surge
Robert Lemos, Contributing Writer,  5/27/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-13757
PUBLISHED: 2020-06-01
Python-RSA 4.0 ignores leading '\0' bytes during decryption of ciphertext. This could conceivably have a security-relevant impact, e.g., by helping an attacker to infer that an application uses Python-RSA, or if the length of accepted ciphertext affects application behavior (such as by causing exces...
CVE-2020-13758
PUBLISHED: 2020-06-01
modules/security/classes/general.post_filter.php/post_filter.php in the Web Application Firewall in Bitrix24 through 20.0.950 allows XSS by placing %00 before the payload.
CVE-2020-9291
PUBLISHED: 2020-06-01
An Insecure Temporary File vulnerability in FortiClient for Windows 6.2.1 and below may allow a local user to gain elevated privileges via exhausting the pool of temporary file names combined with a symbolic link attack.
CVE-2019-15709
PUBLISHED: 2020-06-01
An improper input validation in FortiAP-S/W2 6.2.0 to 6.2.2, 6.0.5 and below, FortiAP-U 6.0.1 and below CLI admin console may allow unauthorized administrators to overwrite system files via specially crafted tcpdump commands in the CLI.
CVE-2020-13695
PUBLISHED: 2020-06-01
In QuickBox Community Edition through 2.5.5 and Pro Edition through 2.1.8, the local www-data user has sudo privileges to execute grep as root without a password, which allows an attacker to obtain sensitive information via a grep of a /root/*.db or /etc/shadow file.