Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Name that Toon: A Dog's Life
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 2 / 7   >   >>
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
1/30/2019 | 11:27:02 PM
js16
"I just don't get their obsession with cat pictures."
FKREITZBERG980
50%
50%
FKREITZBERG980,
User Rank: Moderator
1/30/2019 | 8:10:07 PM
A Dog's Life
I tried to get him to focus on App level permissions but he gave the "Bone Finder" App access to everything.
MrPink10
67%
33%
MrPink10,
User Rank: Strategist
1/30/2019 | 3:05:59 PM
Post
It's a dog tweet dog world.
CloudNative
50%
50%
CloudNative,
User Rank: Apprentice
1/28/2019 | 5:00:30 PM
Mine can't get enough of Pokmon GO
Mine can't get enough of Pokémon GO
acampbell448
0%
100%
acampbell448,
User Rank: Strategist
1/28/2019 | 11:45:15 AM
Subreddit
No wonder the Cat subreddit has become so popular!
WallyDragon
0%
100%
WallyDragon,
User Rank: Strategist
1/25/2019 | 5:23:59 AM
Re: Dog park cartoon
Is it me, or is a dog using a phone just a little bit weird?
Kristendean80
33%
67%
Kristendean80,
User Rank: Strategist
1/24/2019 | 7:19:29 PM
Re: Dog park cartoon
The animal version of taking your cell phone to the bathroom
JohnM217
0%
100%
JohnM217,
User Rank: Strategist
1/24/2019 | 12:50:32 PM
Re: Dog park cartoon
Who would have thought the iBone would be so popular...
Blaze007
100%
0%
Blaze007,
User Rank: Strategist
1/24/2019 | 9:53:49 AM
A Dog's Life
"Fido hasn't picked up a scent yet, but I just know he's bound to sniff packets any day now!"
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
1/24/2019 | 1:20:55 AM
js15
"He's not that smart. He's running iOS 11 on a 5c."
<<   <   Page 2 / 7   >   >>


Attackers Leave Stolen Credentials Searchable on Google
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2021
How to Better Secure Your Microsoft 365 Environment
Kelly Sheridan, Staff Editor, Dark Reading,  1/25/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: We need more votes, check the obituaries.
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-3317
PUBLISHED: 2021-01-26
KLog Server through 2.4.1 allows authenticated command injection. async.php calls shell_exec() on the original value of the source parameter.
CVE-2013-2512
PUBLISHED: 2021-01-26
The ftpd gem 0.2.1 for Ruby allows remote attackers to execute arbitrary OS commands via shell metacharacters in a LIST or NLST command argument within FTP protocol traffic.
CVE-2021-3165
PUBLISHED: 2021-01-26
SmartAgent 3.1.0 allows a ViewOnly attacker to create a SuperUser account via the /#/CampaignManager/users URI.
CVE-2021-1070
PUBLISHED: 2021-01-26
NVIDIA Jetson AGX Xavier Series, Jetson Xavier NX, TX1, TX2, Nano and Nano 2GB, L4T versions prior to 32.5, contains a vulnerability in the apply_binaries.sh script used to install NVIDIA components into the root file system image, in which improper access control is applied, which may lead to an un...
CVE-2021-1071
PUBLISHED: 2021-01-26
NVIDIA Tegra kernel in Jetson AGX Xavier Series, Jetson Xavier NX, TX1, TX2, Nano and Nano 2GB, all L4T versions prior to r32.5, contains a vulnerability in the INA3221 driver in which improper access control may lead to unauthorized users gaining access to system power usage data, which may lead to...