Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Write A Caption & Win A Prize
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 10 / 14   >   >>
syntax_attack
0%
100%
syntax_attack,
User Rank: Strategist
2/18/2016 | 9:48:48 AM
Caption Joke
Someone needs to tell the security department that whole "Hackers can't look up" thing is just a myth.
DW461
80%
20%
DW461,
User Rank: Apprentice
2/18/2016 | 8:14:46 AM
Caption Winner
Bob finally had to admit that his relationship with his ex-wife, ended badly.
rdusek483
0%
100%
rdusek483,
User Rank: Apprentice
2/18/2016 | 6:31:20 AM
Caption
" . . . and you still wonder how the hackers got the malware installed on the hospital computer???"
drmrs
33%
67%
drmrs,
User Rank: Strategist
2/17/2016 | 8:43:06 PM
February 2016 Cartoon Caption Contest
You don't receive airline mileage, when a message appears across the sky with your computer pass word!
Soh0601
0%
100%
Soh0601,
User Rank: Apprentice
2/17/2016 | 8:24:08 PM
Caption
"It's saying I can't use my dog's name as a password again. What's your dog's name?"
sngbrdb
33%
67%
sngbrdb,
User Rank: Apprentice
2/17/2016 | 2:28:09 PM
Drone Security
Drone Security just became a Thing
dritchie
0%
100%
dritchie,
User Rank: Strategist
2/17/2016 | 10:57:15 AM
Caption
For security, don't write down your password and store it under your keyboard.
crimeprophet
33%
67%
crimeprophet,
User Rank: Apprentice
2/17/2016 | 9:38:04 AM
Cartoon Caption
For security, if you forget a password, all your other passwords are reset.
PaulT566
33%
67%
PaulT566,
User Rank: Strategist
2/17/2016 | 8:54:22 AM
Caption contest
The NSA decided to help Bob with his password after hearing him say he forgot what he changed it to.
loamwit
33%
67%
loamwit,
User Rank: Apprentice
2/17/2016 | 8:37:59 AM
Cartoon Caption
"The media always blows these hacks out of proportion."
<<   <   Page 10 / 14   >   >>


When It Comes To Security Tools, More Isn't More
Lamont Orange, Chief Information Security Officer at Netskope,  1/11/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-16961
PUBLISHED: 2021-01-15
SolarWinds Web Help Desk 12.7.0 allows XSS via a Schedule Name.
CVE-2020-35733
PUBLISHED: 2021-01-15
An issue was discovered in Erlang/OTP before 23.2.2. The ssl application 10.2 accepts and trusts an invalid X.509 certificate chain to a trusted root Certification Authority.
CVE-2021-23836
PUBLISHED: 2021-01-15
An issue was discovered in flatCore before 2.0.0 build 139. A stored XSS vulnerability was identified in the prefs_smtp_psw HTTP request body parameter for the acp interface. An admin user can inject malicious client-side script into the affected parameter without any form of input sanitization. The...
CVE-2021-23837
PUBLISHED: 2021-01-15
An issue was discovered in flatCore before 2.0.0 build 139. A time-based blind SQL injection was identified in the selected_folder HTTP request body parameter for the acp interface. The affected parameter (which retrieves the file contents of the specified folder) was found to be accepting malicious...
CVE-2021-23838
PUBLISHED: 2021-01-15
An issue was discovered in flatCore before 2.0.0 build 139. A reflected XSS vulnerability was identified in the media_filter HTTP request body parameter for the acp interface. The affected parameter accepts malicious client-side script without proper input sanitization. For example, a malicious user...