Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Name That Toon: It's A Dog's Life
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 9 / 9
User Rank: Strategist
4/4/2016 | 9:36:02 AM
IT's a dog's life !
WHo's on first, dogs on second, bow-wow on thrid !
User Rank: Apprentice
4/4/2016 | 8:22:09 AM
Why yes, we ARE proud of him! He's only 3 course hours away from a earning is Bachelor's from Strayer.
User Rank: Apprentice
4/2/2016 | 7:29:20 PM
It's one of those new White Russian Terriers.
User Rank: Apprentice
4/2/2016 | 1:36:04 PM
When you said you were hiring a "cybersecurity watchdog", I had a different mental picture.
User Rank: Apprentice
4/2/2016 | 12:48:42 PM
Re: Caption
He's come pretty far from only sniffing the rear ends of packets.
User Rank: Strategist
4/1/2016 | 6:37:50 PM
Name that Toon: It's A Dog's Life
BlackHat hackers getting more sophisticated by the day: we make it so easy with end point solutions that look like a dog's breakfast. 
User Rank: Apprentice
4/1/2016 | 5:22:13 PM
I keep telling him that Fidonet isn't a thing any more, but he just won't listen...
<<   <   Page 9 / 9

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
Creating an Effective Incident Response Plan
Security teams are realizing their organizations will experience a cyber incident at some point. An effective incident response plan that takes into account their specific requirements and has been tested is critical. This issue of Tech Insights also includes: -a look at the newly signed cyber-incident law, -how organizations can apply behavioral psychology to incident response, -and an overview of the Open Cybersecurity Schema Framework.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2022-11-29
An out-of-bounds read flaw was found in the QXL display device emulation in QEMU. The qxl_phys2virt() function does not check the size of the structure pointed to by the guest physical address, potentially reading past the end of the bar space into adjacent pages. A malicious guest user could use th...
PUBLISHED: 2022-11-29
An integer overflow and buffer overflow issues were found in the ACPI Error Record Serialization Table (ERST) device of QEMU in the read_erst_record() and write_erst_record() functions. Both issues may allow the guest to overrun the host buffer allocated for the ERST memory device. A malicious guest...
PUBLISHED: 2022-11-29
Discourse is an open-source discussion platform. Prior to version 2.8.13 of the `stable` branch and version 2.9.0.beta14 of the `beta` and `tests-passed` branches, unauthorized users may learn of the existence of hidden tags and that they have been applied to topics that they have access to. This is...
PUBLISHED: 2022-11-29
The package com.github.samtools:htsjdk before 3.0.1 are vulnerable to Creation of Temporary File in Directory with Insecure Permissions due to the createTempDir() function in util/IOUtil.java not checking for the existence of the temporary directory before attempting to create it.
PUBLISHED: 2022-11-29
This affects all versions of package static-dev-server. This is because when paths from users to the root directory are joined, the assets for the path accessed are relative to that of the root directory.