Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Name That Toon: Mobile (In)security
Newest First  |  Oldest First  |  Threaded View
Page 1 / 11   >   >>
Je6
50%
50%
Je6,
User Rank: Strategist
8/11/2017 | 7:19:07 AM
Mobile (In)security
"So much for outsourcing risk to the cloud."
halfspin
50%
50%
halfspin,
User Rank: Apprentice
3/14/2017 | 5:46:18 PM
Name That Toon
It's raining LOLcats and dogs!
jdeters554
50%
50%
jdeters554,
User Rank: Apprentice
3/14/2017 | 5:21:43 PM
Indiegogo beat you to it
"Looks like the Indiegogo campaign for SELFLY is fully funded."
chris_tina_learning
50%
50%
chris_tina_learning,
User Rank: Apprentice
3/14/2017 | 10:27:35 AM
Re: BYOD
How about... BYOD?  What?!  IT on strike!  Out for coffee..
EricN135
50%
50%
EricN135,
User Rank: Apprentice
3/12/2017 | 8:40:59 AM
BYOD
So, how's the mobile device management roll-out going?
Three_Racoons
50%
50%
Three_Racoons,
User Rank: Apprentice
3/10/2017 | 4:13:27 AM
Check out our new caption contest!
"After awhile, the Barney theme song ringtone would get to anyone..."
omnijoe
100%
0%
omnijoe,
User Rank: Apprentice
3/9/2017 | 1:39:43 PM
Re: Check out our new caption contest!
Bill told the intern to find a smartphone that couldn't be hacked.
q-dude
100%
0%
q-dude,
User Rank: Apprentice
3/9/2017 | 11:53:19 AM
name-that-toon
I kept telling them not to hire that engineer that used to work at the drone company.
EHK62
50%
50%
EHK62,
User Rank: Apprentice
3/9/2017 | 10:09:41 AM
Re: 192.168.0.1
I think your comment broke their phones. Heads up!
YCR
100%
0%
YCR,
User Rank: Apprentice
3/8/2017 | 3:18:57 PM
Name That Toon
Ever since Congress offered free healthcare in exchange for iPhones, everyone is handing over their phones!
Page 1 / 11   >   >>


How to Better Secure Your Microsoft 365 Environment
Kelly Sheridan, Staff Editor, Dark Reading,  1/25/2021
Attackers Leave Stolen Credentials Searchable on Google
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-3331
PUBLISHED: 2021-01-27
WinSCP before 5.17.10 allows remote attackers to execute arbitrary programs when the URL handler encounters a crafted URL that loads session settings. (For example, this is exploitable in a default installation in which WinSCP is the handler for sftp:// URLs.)
CVE-2021-3326
PUBLISHED: 2021-01-27
The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid input sequences in the ISO-2022-JP-3 encoding, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service.
CVE-2021-22641
PUBLISHED: 2021-01-27
A heap-based buffer overflow issue has been identified in the way the application processes project files, allowing an attacker to craft a special project file that may allow arbitrary code execution on the Tellus Lite V-Simulator and V-Server Lite (versions prior to 4.0.10.0).
CVE-2021-22653
PUBLISHED: 2021-01-27
Multiple out-of-bounds write issues have been identified in the way the application processes project files, allowing an attacker to craft a special project file that may allow arbitrary code execution on the Tellus Lite V-Simulator and V-Server Lite (versions prior to 4.0.10.0).
CVE-2021-22655
PUBLISHED: 2021-01-27
Multiple out-of-bounds read issues have been identified in the way the application processes project files, allowing an attacker to craft a special project file that may allow arbitrary code execution on the Tellus Lite V-Simulator and V-Server Lite (versions prior to 4.0.10.0).