Comments
Name That Toon: Screen Sharing
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 3 / 13   >   >>
Pjbracer1
100%
0%
Pjbracer1,
User Rank: Apprentice
9/25/2017 | 6:14:22 AM
Screen Sharing
Ive been looking for a secure an fast browser, Ive think ive found one, look its Edge!
ChrisF201
67%
33%
ChrisF201,
User Rank: Apprentice
9/20/2017 | 2:43:26 PM
Name That Toon: Screen Sharing
Jan, check this out! I found an unhackable PC.
BKULIK024
50%
50%
BKULIK024,
User Rank: Apprentice
9/19/2017 | 12:16:48 PM
Caption Contest
Don't worry, it's just Andrew in Software Development showing his power point of all the new features he's planning to add in the next release.
Jeremy@hlf
0%
100%
[email protected],
User Rank: Apprentice
9/18/2017 | 11:12:36 PM
Name That Toon: Screen Sharing
That sucks!! I asked for a Million bucks and they gave me a trojan horse instead!!
james.lopez@westernhome.org
0%
100%
[email protected],
User Rank: Apprentice
9/15/2017 | 10:21:06 AM
Name That Toon: Screen Sharing
I asked for HD and Tech Support heard 3D.
EddieCorreia01
0%
100%
EddieCorreia01,
User Rank: Apprentice
9/14/2017 | 7:10:32 PM
Hey Carol, can I borrow your stapler?
Hey Carol, can I borrow your stapler? 
palcivar@ammsusa.com
50%
50%
[email protected],
User Rank: Apprentice
9/14/2017 | 2:31:58 PM
Caption Unicorn
I knew I shouldn't have installed that Kaspersky software.
Markanzzouri940
50%
50%
Markanzzouri940,
User Rank: Apprentice
9/14/2017 | 1:04:35 PM
name that toon
No, Harold the day to day here is always mundane no unusual rainbows, leprechauns, or unicorns.
ccornil2
67%
33%
ccornil2,
User Rank: Strategist
9/12/2017 | 3:18:18 PM
Re: Pending Review
"Hello, I'd like to add you to my network on LinkedIn."
ccornil2
50%
50%
ccornil2,
User Rank: Strategist
9/12/2017 | 3:17:23 PM
Unicorn caption contest
"Steve, you wouldn't know a billion dollar opportunity if it were staring you in the face."
<<   <   Page 3 / 13   >   >>


Weaponizing IPv6 to Bypass IPv4 Security
John Anderson, Principal Security Consultant, Trustwave Spiderlabs,  6/12/2018
'Shift Left' & the Connected Car
Rohit Sethi, COO of Security Compass,  6/12/2018
Why CISOs Need a Security Reality Check
Joel Fulton, Chief Information Security Officer for Splunk,  6/13/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-10617
PUBLISHED: 2018-06-18
Delta Electronics Delta Industrial Automation DOPSoft version 4.00.04 and prior utilizes a fixed-length heap buffer where a value larger than the buffer can be read from a .dpa file into the buffer, causing the buffer to be overwritten. This may allow remote code execution or cause the application t...
CVE-2018-10621
PUBLISHED: 2018-06-18
Delta Electronics Delta Industrial Automation DOPSoft version 4.00.04 and prior utilizes a fixed-length stack buffer where a value larger than the buffer can be read from a .dpa file into the buffer, causing the buffer to be overwritten. This may allow remote code execution or cause the application ...
CVE-2018-10623
PUBLISHED: 2018-06-18
Delta Electronics Delta Industrial Automation DOPSoft version 4.00.04 and prior performs read operations on a memory buffer where the position can be determined by a value read from a .dpa file. This may cause improper restriction of operations within the bounds of the memory buffer, allow remote co...
CVE-2015-4664
PUBLISHED: 2018-06-18
An improper input validation vulnerability in CA Privileged Access Manager 2.4.4.4 and earlier allows remote attackers to execute arbitrary commands.
CVE-2018-9021
PUBLISHED: 2018-06-18
An authentication bypass vulnerability in CA Privileged Access Manager 2.8.2 and earlier allows remote attackers to execute arbitrary commands with specially crafted requests.