Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Name That Toon: Mobile Threat
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 3 / 9   >   >>
Joe Stanganelli
100%
0%
Joe Stanganelli,
User Rank: Ninja
7/27/2018 | 3:48:40 PM
jgen08
"To have your wishes granted, click on the following bitlink!"
Joe Stanganelli
100%
0%
Joe Stanganelli,
User Rank: Ninja
7/26/2018 | 4:32:31 PM
jgen07
"I'm sorry, but your wishes aren't compatible with the latest version of iOS."
Joe Stanganelli
25%
75%
Joe Stanganelli,
User Rank: Ninja
7/26/2018 | 4:30:37 PM
jgen06
"Okay, I'll grant your wish if you grant mine: Stop taking those pictures and sending them to your Tinder matches."
Joe Stanganelli
67%
33%
Joe Stanganelli,
User Rank: Ninja
7/26/2018 | 4:27:52 PM
jgen05
"Well, for 2 Bitcoin, you can wish to get all of your data back."
KCondit
75%
25%
KCondit,
User Rank: Strategist
7/26/2018 | 1:37:55 PM
Cartoon caption contest
Me:  I wish to live forever

Genie:  Nope, sorry. I can't grant such a wish. Not allowed.

Me: OK.  I wish to die the very day after all of our politicians put the needs of their constituents and the country above their own needs and above party politics.

Genie:  You crafty bastard.

 

 
camerobabe
100%
0%
camerobabe,
User Rank: Strategist
7/26/2018 | 11:31:45 AM
Re: New Dark Reading Caption contest!
Contrary to popular opinion, Security doesn't "magically happen."
cy6
67%
33%
cy6,
User Rank: Apprentice
7/26/2018 | 6:23:03 AM
toon caption
I can fix your bad hair and fashion sense, but securing your phone is beyond my power.
jnash46801
100%
0%
jnash46801,
User Rank: Strategist
7/25/2018 | 6:35:39 PM
Name That Toon: Mobile Threat
Our penetration testing has identified a vulnerability.
ronrob123
50%
50%
ronrob123,
User Rank: Apprentice
7/25/2018 | 1:45:45 PM
name that toon
password please!
kdubs162
100%
0%
kdubs162,
User Rank: Strategist
7/25/2018 | 7:29:39 AM
Re: New Dark Reading Caption contest!
How else did you think digital assistants work?
<<   <   Page 3 / 9   >   >>


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Enterprise Cybersecurity Plans in a Post-Pandemic World
Download the Enterprise Cybersecurity Plans in a Post-Pandemic World report to understand how security leaders are maintaining pace with pandemic-related challenges, and where there is room for improvement.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-20691
PUBLISHED: 2021-09-27
An issue in Monstra CMS v3.0.4 allows attackers to execute arbitrary web scripts or HTML via bypassing the file extension filter and uploading crafted HTML files.
CVE-2020-20692
PUBLISHED: 2021-09-27
GilaCMS v1.11.4 was discovered to contain a SQL injection vulnerability via the $_GET parameter in /src/core/controllers/cm.php.
CVE-2020-20693
PUBLISHED: 2021-09-27
A Cross-Site Request Forgery (CSRF) in GilaCMS v1.11.4 allows authenticated attackers to arbitrarily add administrator accounts.
CVE-2020-20695
PUBLISHED: 2021-09-27
A stored cross-site scripting (XSS) vulnerability in GilaCMS v1.11.4 allows attackers to execute arbitrary web scripts or HTML via a crafted SVG file.
CVE-2020-20696
PUBLISHED: 2021-09-27
A cross-site scripting (XSS) vulnerability in /admin/content/post of GilaCMS v1.11.4 allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the Tags field.