Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Write A Caption & Win A Prize
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 8 / 14   >   >>
RyanSepe
0%
100%
RyanSepe,
User Rank: Ninja
2/22/2016 | 12:22:55 PM
Soft Token
"I had something else in mind when you told me we were getting soft tokens."
rbeaman800
0%
100%
rbeaman800,
User Rank: Apprentice
2/22/2016 | 11:48:12 AM
write a caption password security
" ..well you told me not to write it down!  so i keep it on my facebook page, and it's private, right?!"
MaciejJustat
0%
100%
MaciejJustat,
User Rank: Apprentice
2/22/2016 | 10:59:04 AM
Cartoon Caption
"These automated password resets are getting out of hand."
mikegresham
20%
80%
mikegresham,
User Rank: Apprentice
2/22/2016 | 10:17:02 AM
Caption
I should have known better than breaking up with an IT Professional with a pilots license!
flemingi
0%
100%
flemingi,
User Rank: Apprentice
2/21/2016 | 8:32:13 PM
Now that I have LifeLock, I know that my password is so much more secure.
Now that I have LifeLock, I know that my password is so much more secure.
snowbiz2016
50%
50%
snowbiz2016,
User Rank: Apprentice
2/21/2016 | 4:58:14 PM
cartoon caption
I just dont understand why mangement is spending real money and time on somethingn they call " 2 factor authentication" ...its not like our 4 character passwords are weak or avialble to just anyone.
Steelheadcase
40%
60%
Steelheadcase,
User Rank: Apprentice
2/21/2016 | 3:10:51 PM
Caption post
"So Bob, how's that 'Meet Smoking Hot Russian Women' dating site working out?"
Joe Stanganelli
56%
44%
Joe Stanganelli,
User Rank: Ninja
2/21/2016 | 11:08:12 AM
Caption try #3
"I'm glad to see you're no longer keeping sticky notes on your monitor, Ed."
Joe Stanganelli
20%
80%
Joe Stanganelli,
User Rank: Ninja
2/20/2016 | 8:06:04 PM
Caption try #2
"Jim, my eyes are up here."
Joe Stanganelli
0%
100%
Joe Stanganelli,
User Rank: Ninja
2/20/2016 | 8:00:29 PM
Caption try
The pen testers are charging way too much for overhead.
<<   <   Page 8 / 14   >   >>


COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/6/2020
Ripple20 Threatens Increasingly Connected Medical Devices
Kelly Sheridan, Staff Editor, Dark Reading,  6/30/2020
DDoS Attacks Jump 542% from Q4 2019 to Q1 2020
Dark Reading Staff 6/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-15570
PUBLISHED: 2020-07-06
The parse_report() function in whoopsie.c in Whoopsie through 0.2.69 mishandles memory allocation failures, which allows an attacker to cause a denial of service via a malformed crash file.
CVE-2020-15569
PUBLISHED: 2020-07-06
PlayerGeneric.cpp in MilkyTracker through 1.02.00 has a use-after-free in the PlayerGeneric destructor.
CVE-2020-7690
PUBLISHED: 2020-07-06
It's possible to inject JavaScript code via the html method.
CVE-2020-7691
PUBLISHED: 2020-07-06
It's possible to use &lt;&lt;script&gt;script&gt; in order to go over the filtering regex.
CVE-2020-15562
PUBLISHED: 2020-07-06
An issue was discovered in Roundcube Webmail before 1.2.11, 1.3.x before 1.3.14, and 1.4.x before 1.4.7. It allows XSS via a crafted HTML e-mail message, as demonstrated by a JavaScript payload in the xmlns (aka XML namespace) attribute of a HEAD element when an SVG element exists.