Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Name That Toon: Mobile (In)security
Newest First  |  Oldest First  |  Threaded View
Page 1 / 11   >   >>
Je6
Je6,
User Rank: Strategist
8/11/2017 | 7:19:07 AM
Mobile (In)security
"So much for outsourcing risk to the cloud."
halfspin
halfspin,
User Rank: Apprentice
3/14/2017 | 5:46:18 PM
Name That Toon
It's raining LOLcats and dogs!
jdeters554
jdeters554,
User Rank: Apprentice
3/14/2017 | 5:21:43 PM
Indiegogo beat you to it
"Looks like the Indiegogo campaign for SELFLY is fully funded."
chris_tina_learning
chris_tina_learning,
User Rank: Apprentice
3/14/2017 | 10:27:35 AM
Re: BYOD
How about... BYOD?  What?!  IT on strike!  Out for coffee..
EricN135
EricN135,
User Rank: Apprentice
3/12/2017 | 8:40:59 AM
BYOD
So, how's the mobile device management roll-out going?
Three_Racoons
Three_Racoons,
User Rank: Apprentice
3/10/2017 | 4:13:27 AM
Check out our new caption contest!
"After awhile, the Barney theme song ringtone would get to anyone..."
omnijoe
omnijoe,
User Rank: Apprentice
3/9/2017 | 1:39:43 PM
Re: Check out our new caption contest!
Bill told the intern to find a smartphone that couldn't be hacked.
q-dude
q-dude,
User Rank: Apprentice
3/9/2017 | 11:53:19 AM
name-that-toon
I kept telling them not to hire that engineer that used to work at the drone company.
EHK62
EHK62,
User Rank: Apprentice
3/9/2017 | 10:09:41 AM
Re: 192.168.0.1
I think your comment broke their phones. Heads up!
YCR
YCR,
User Rank: Strategist
3/8/2017 | 3:18:57 PM
Name That Toon
Ever since Congress offered free healthcare in exchange for iPhones, everyone is handing over their phones!
Page 1 / 11   >   >>


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Creating an Effective Incident Response Plan
Security teams are realizing their organizations will experience a cyber incident at some point. An effective incident response plan that takes into account their specific requirements and has been tested is critical. This issue of Tech Insights also includes: -a look at the newly signed cyber-incident law, -how organizations can apply behavioral psychology to incident response, -and an overview of the Open Cybersecurity Schema Framework.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-4257
PUBLISHED: 2022-12-01
A vulnerability was found in C-DATA Web Management System. It has been rated as critical. This issue affects some unknown processing of the file cgi-bin/jumpto.php of the component GET Parameter Handler. The manipulation of the argument hostname leads to argument injection. The attack may be initiat...
CVE-2022-37016
PUBLISHED: 2022-12-01
Symantec Endpoint Protection (Windows) agent may be susceptible to a Privilege Escalation vulnerability, which is a type of issue whereby an attacker may attempt to compromise the software application to gain elevated access to resources that are normally protected from an application or user.
CVE-2022-37017
PUBLISHED: 2022-12-01
Symantec Endpoint Protection (Windows) agent, prior to 14.3 RU6/14.3 RU5 Patch 1, may be susceptible to a Security Control Bypass vulnerability, which is a type of issue that can potentially allow a threat actor to circumvent existing security controls. This CVE applies narrowly to the Client User I...
CVE-2022-28607
PUBLISHED: 2022-12-01
An issue was discovered in asith-eranga ISIC tour booking through version published on Feb 13th 2018, allows attackers to gain sensitive information via the action parameter to /system/user/modules/mod_users/controller.php.
CVE-2022-30528
PUBLISHED: 2022-12-01
SQL Injection vulnerability in asith-eranga ISIC tour booking through version published on Feb 13th 2018, allows attackers to execute arbitrary commands via the username parameter to /system/user/modules/mod_users/controller.php.