Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Name That Cartoon: Luck O' The Irish
Oldest First  |  Newest First  |  Threaded View
<<   <   Page 2 / 11   >   >>
nytcrwlr70
nytcrwlr70,
User Rank: Apprentice
3/3/2014 | 6:53:26 PM
Name That Cartoon: Luck O' The Irish Entry
Who told you that the TouchPads were worth their weight in gold?
Kristin Burnham
Kristin Burnham,
User Rank: Apprentice
3/3/2014 | 8:47:54 PM
Re: Caption Contest
+1
The Penguin
The Penguin,
User Rank: Apprentice
3/3/2014 | 9:32:42 PM
Re: Caption Contest
Alas, all that glitters is not gold.
The Penguin
The Penguin,
User Rank: Apprentice
3/3/2014 | 9:36:06 PM
Re: Caption Contest
Someone's full of Bullarney.
The Penguin
The Penguin,
User Rank: Apprentice
3/3/2014 | 9:40:16 PM
Re: Caption Contest
There's gold in them thar circuit boards.
kgreenhow530
kgreenhow530,
User Rank: Apprentice
3/4/2014 | 9:39:58 AM
caption
Looks like someone swapped the gold for these. Not quite the same...
ben@thedatacave.com
[email protected],
User Rank: Apprentice
3/4/2014 | 11:11:55 AM
Pot o' Gold
I'll just leave these colorful 5C's here in case anyone actually comes looking for one!
RobPreston
RobPreston,
User Rank: Apprentice
3/4/2014 | 1:57:23 PM
Re: Pot o' Gold
I get the smartphones, but why again are we dressed like Quakers?
Marilyn Cohodas
Marilyn Cohodas,
User Rank: Strategist
3/5/2014 | 9:33:51 AM
Cartoon contest -- Keep your captions coming!
We've got some hysterical entries in our cartoon caption contest. Have you entered yours? 
rtopper480
rtopper480,
User Rank: Apprentice
3/7/2014 | 10:10:34 AM
Caption contest
Whoever finds this pot is going to be disappointed to find it full of Androids!
<<   <   Page 2 / 11   >   >>


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Creating an Effective Incident Response Plan
Security teams are realizing their organizations will experience a cyber incident at some point. An effective incident response plan that takes into account their specific requirements and has been tested is critical. This issue of Tech Insights also includes: -a look at the newly signed cyber-incident law, -how organizations can apply behavioral psychology to incident response, -and an overview of the Open Cybersecurity Schema Framework.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-4194
PUBLISHED: 2022-11-30
Use after free in Accessibility in Google Chrome prior to 108.0.5359.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)
CVE-2022-4195
PUBLISHED: 2022-11-30
Insufficient policy enforcement in Safe Browsing in Google Chrome prior to 108.0.5359.71 allowed a remote attacker to bypass Safe Browsing warnings via a malicious file. (Chromium security severity: Medium)
CVE-2022-4175
PUBLISHED: 2022-11-30
Use after free in Camera Capture in Google Chrome prior to 108.0.5359.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CVE-2022-4176
PUBLISHED: 2022-11-30
Out of bounds write in Lacros Graphics in Google Chrome on Chrome OS and Lacros prior to 108.0.5359.71 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via UI interactions. (Chromium security severity: High)
CVE-2022-4177
PUBLISHED: 2022-11-30
Use after free in Extensions in Google Chrome prior to 108.0.5359.71 allowed an attacker who convinced a user to install an extension to potentially exploit heap corruption via a crafted Chrome Extension and UI interaction. (Chromium security severity: High)