Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Write A Caption & Win A Prize
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 14 / 14
JohnD22901
JohnD22901,
User Rank: Apprentice
2/13/2016 | 3:15:32 PM
Contest Entry
"I can't believe these password reminders are still being sent in plane-text"
doorstepman
doorstepman,
User Rank: Apprentice
2/13/2016 | 3:15:07 PM
remembering your pin
You're not going to remember your pin by looking at the sky.
nipsy
nipsy,
User Rank: Apprentice
2/13/2016 | 12:48:26 PM
caption
Is the six upper or lower case?

 

 

(seriously ive been asked this more than once)
RetiredUser
RetiredUser,
User Rank: Ninja
2/13/2016 | 11:09:37 AM
"For the Love" Entry
Linda says:  "Sec. 406 of the Cybersecurity Information Sharing Act of 2015 states multi-factor logical access controls include 'Information that is known to the user, such as a password or personal identification number' but it's pretty vague on how it is known."

Roger has a suspicion hiring Linda does not lend to improved "cybersecurity in the United States through enhanced sharing of information about cybersecurity threats, and for other purposes."

(Note: This is not a contest entry, just for the love of the comic!)
<<   <   Page 14 / 14


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Developing and Testing an Effective Breach Response Plan
Whether or not a data breach is a disaster for the organization depends on the security team's response and that is based on how the team developed a breach response plan beforehand and if it was thoroughly tested. Inside this report, experts share how to: -understand the technical environment, -determine what types of incidents would trigger the plan, -know which stakeholders need to be notified and how to do so, -develop steps to contain the breach, collect evidence, and initiate recovery.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-4122
PUBLISHED: 2022-12-08
A vulnerability was found in buildah. Incorrect following of symlinks while reading .containerignore and .dockerignore results in information disclosure.
CVE-2022-4123
PUBLISHED: 2022-12-08
A flaw was found in Buildah. The local path and the lowest subdirectory may be disclosed due to incorrect absolute path traversal, resulting in an impact to confidentiality.
CVE-2022-45509
PUBLISHED: 2022-12-08
Tenda W30E V1.0.1.25(633) was discovered to contain a stack overflow via the account parameter at /goform/addUserName.
CVE-2022-45510
PUBLISHED: 2022-12-08
Tenda W30E V1.0.1.25(633) was discovered to contain a stack overflow via the mit_ssid_index parameter at /goform/AdvSetWrlsafeset.
CVE-2022-45511
PUBLISHED: 2022-12-08
Tenda W30E V1.0.1.25(633) was discovered to contain a stack overflow via the PPPOEPassword parameter at /goform/QuickIndex.