Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Name That Toon: Screen Sharing
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 11 / 13   >   >>
temp55
temp55,
User Rank: Apprentice
5/15/2017 | 11:56:17 AM
ahhhh
I really hope this will finally end...many people has been triggered by this...total chaos.
clone13
clone13,
User Rank: Strategist
5/15/2017 | 11:14:46 AM
caption
this new malware is insane, it wants 2 bitcoins, or it will release a glitter bomb.
JasonF217
JasonF217,
User Rank: Strategist
5/15/2017 | 10:10:04 AM
Caption
"My computer is totally hack proof"
AMoss
AMoss,
User Rank: Guru
5/15/2017 | 9:05:02 AM
caption
e-Trade has really stepped up their game...
UselessBanter
UselessBanter,
User Rank: Apprentice
5/13/2017 | 6:14:01 PM
Cartoon Caption
I guess the security team upgraded the idle timeout features. I heard this happens when you forget to lock your workstation before walking away.
crouton8
crouton8,
User Rank: Apprentice
5/13/2017 | 9:29:40 AM
Re: Computer Jeasouly
I typed in a Unicorn Resource Locator and it just appeared
D. J.
D. J.,
User Rank: Apprentice
5/12/2017 | 12:35:12 PM
Computer Jeasouly
How did he get a 3-D monitor? He caught the head of IT surfing porn at work.
Aditya123
Aditya123,
User Rank: Apprentice
5/12/2017 | 12:25:26 AM
CARTOON CONTEST
SOFTWARE BUG HAUNTS ME AGAIN
jamminjamie
jamminjamie,
User Rank: Strategist
5/11/2017 | 11:42:10 AM
Cartoon Contest
"Now I understand why the Surface Studio is so expensive..."
jb2328
jb2328,
User Rank: Apprentice
5/10/2017 | 12:01:55 PM
Breakroom
If I were you I'd skip the brownies in the breakroom today.....
<<   <   Page 11 / 13   >   >>


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Creating an Effective Incident Response Plan
Security teams are realizing their organizations will experience a cyber incident at some point. An effective incident response plan that takes into account their specific requirements and has been tested is critical. This issue of Tech Insights also includes: -a look at the newly signed cyber-incident law, -how organizations can apply behavioral psychology to incident response, -and an overview of the Open Cybersecurity Schema Framework.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-4194
PUBLISHED: 2022-11-30
Use after free in Accessibility in Google Chrome prior to 108.0.5359.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)
CVE-2022-4195
PUBLISHED: 2022-11-30
Insufficient policy enforcement in Safe Browsing in Google Chrome prior to 108.0.5359.71 allowed a remote attacker to bypass Safe Browsing warnings via a malicious file. (Chromium security severity: Medium)
CVE-2022-4175
PUBLISHED: 2022-11-30
Use after free in Camera Capture in Google Chrome prior to 108.0.5359.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CVE-2022-4176
PUBLISHED: 2022-11-30
Out of bounds write in Lacros Graphics in Google Chrome on Chrome OS and Lacros prior to 108.0.5359.71 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via UI interactions. (Chromium security severity: High)
CVE-2022-4177
PUBLISHED: 2022-11-30
Use after free in Extensions in Google Chrome prior to 108.0.5359.71 allowed an attacker who convinced a user to install an extension to potentially exploit heap corruption via a crafted Chrome Extension and UI interaction. (Chromium security severity: High)