Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operations

3/12/2016
06:00 AM
John Klossner
John Klossner
Cartoon Contest
100%
0%

Cartoon: Getting To Know You

 

John Klossner has been drawing technology cartoons for more than 15 years. His work regularly appears in Computerworld and Federal Computer Week. His illustrations and cartoons have also been published in The New Yorker, Barron's, and The Wall Street Journal. Web site: ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Whoopty
100%
0%
Whoopty,
User Rank: Ninja
3/21/2016 | 9:18:31 AM
Dead on
Although obviously poking fun at things, this cartoon is probaly not far from the truth. We just won't be staring at screens - we'll have our Google Glasses on instead.
hewenthatway
50%
50%
hewenthatway,
User Rank: Strategist
3/15/2016 | 6:17:40 PM
Re: how do I thumbs up a caption?
thx!  Such a bright, prominent, and large thumbs up/down, I don't know how I missed it this long :)  thank you
Marilyn Cohodas
100%
0%
Marilyn Cohodas,
User Rank: Strategist
3/14/2016 | 1:56:08 PM
Re: how do I thumbs up a caption?
You can thumbs up the "comment" with the caption, @hewenthatway! Which I just did to yours! 

But fear not, another caption contest will be coming in a few weeks. So you'll have plenty of fresh opportunities.

 

 
hewenthatway
100%
0%
hewenthatway,
User Rank: Strategist
3/12/2016 | 7:16:41 AM
how do I thumbs up a caption?
I enjoyed the last caption contest for the readers; but I must say, sometimes these captions of these cartoons are dead-on. this is an excellent example. This right here is my new favorite cartoon caption... K+ #edit 5:19am added k+ for relevance to title
COVID-19: Latest Security News & Commentary
Dark Reading Staff 4/7/2020
The Coronavirus & Cybersecurity: 3 Areas of Exploitation
Robert R. Ackerman Jr., Founder & Managing Director, Allegis Capital,  4/7/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
State of Cybersecurity Incident Response
State of Cybersecurity Incident Response
Data breaches and regulations have forced organizations to pay closer attention to the security incident response function. However, security leaders may be overestimating their ability to detect and respond to security incidents. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-11655
PUBLISHED: 2020-04-09
SQLite through 3.31.1 allows attackers to cause a denial of service (segmentation fault) via a malformed window-function query because the AggInfo object's initialization is mishandled.
CVE-2020-11656
PUBLISHED: 2020-04-09
In SQLite through 3.31.1, the ALTER TABLE implementation has a use-after-free, as demonstrated by an ORDER BY clause that belongs to a compound SELECT statement.
CVE-2019-20637
PUBLISHED: 2020-04-08
An issue was discovered in Varnish Cache before 6.0.5 LTS, 6.1.x and 6.2.x before 6.2.2, and 6.3.x before 6.3.1. It does not clear a pointer between the handling of one client request and the next request within the same connection. This sometimes causes information to be disclosed from the connecti...
CVE-2020-11650
PUBLISHED: 2020-04-08
An issue was discovered in iXsystems FreeNAS 11.2 and 11.3 before 11.3-U1. It allows a denial of service.
CVE-2020-11653
PUBLISHED: 2020-04-08
An issue was discovered in Varnish Cache before 6.0.6 LTS, 6.1.x and 6.2.x before 6.2.3, and 6.3.x before 6.3.2. It occurs when communication with a TLS termination proxy uses PROXY version 2. There can be an assertion failure and daemon restart, which causes a performance loss.