Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


End of Bibblio RCM includes -->
10:00 AM
John Klossner
John Klossner
Cartoon Contest

Name That Toon: Beat the Heat

We provide the cartoon. You write the caption!
We provide the cartoon. You write the caption!

Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card. If you don't want to enter a caption, help us pick a winner by voting on the submissions. Click thumbs-up for those you find funny; thumbs-down, not so. As always, editorial comments are encouraged and welcomed. Click here for contest rules. For advice on how to beat the competition, check out How To Win A Cartoon Caption Contest. The contest closes August 15.

Related Content:


Black Hat USA returns to Las Vegas with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions, and service providers in the Business Hall. Click for information on the conference and to register.


John Klossner has been drawing technology cartoons for more than 15 years. His work regularly appears in Computerworld and Federal Computer Week. His illustrations and cartoons have also been published in The New Yorker, Barron's, and The Wall Street Journal. Web site: ... View Full Bio

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Page 1 / 6   >   >>
User Rank: Apprentice
9/25/2019 | 8:55:23 AM
Beat the Heat: misreading the thermostat
Delores was a literal programmer preferring fixed values in source code wherever possible and badly misunderstood a colleague that said, "I'm drowing in work".
User Rank: Apprentice
8/18/2019 | 10:02:45 AM
Lifeguard on Duty
Lifeguard: [ waving naval flags ] Slide back to the firewall! You are blocking the ports! Repeat! You are blocking the bubble ports!


User Rank: Apprentice
8/15/2019 | 5:04:48 PM
Re: New End Point Security
Everyone remain calm during software updates, sharks can smell vunerabilties !
User Rank: Strategist
8/14/2019 | 3:54:51 PM
Name That Toon: Beat the Heat
User Rank: Apprentice
8/13/2019 | 1:25:21 PM
Cybersecurity Awareness
Guarantee: Our Cybersecurity Awareness messages will get to our end users!
User Rank: Strategist
8/7/2019 | 8:55:32 PM
Caption Contest
Oh the lifeguard?
It was an unfortunate typo in a memo stating "We need someone to handle GDPR" was autocorrected to "We need someone to handle CPR".
On the upside, we have to wait for 30 minutes after lunch before being allowed back at our desks.
User Rank: Strategist
8/7/2019 | 8:48:40 PM
Caption Contest
Hey you!
Yes, you. No Running ... as Admin. Save that for your own network at home.
User Rank: Apprentice
8/7/2019 | 1:49:46 PM
The instructive guard
User Rank: Apprentice
8/2/2019 | 5:54:41 PM
Re: New Caption Contest!
Reminder: Wait one hour after eating before swimming in the VM Server Pool.
User Rank: Apprentice
8/1/2019 | 2:04:22 PM
Name That Toon: Beat the Heat
When you apply for the Supervisor position, but you lied on your resume and you have no idea what you're doing.
Page 1 / 6   >   >>
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
Black Hat USA 2022 Attendee Report
Black Hat attendees are not sleeping well. Between concerns about attacks against cloud services, ransomware, and the growing risks to the global supply chain, these security pros have a lot to be worried about. Read our 2022 report to hear what they're concerned about now.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2022-08-17
libtiff's tiffcrop utility has a uint32_t underflow that can lead to out of bounds read and write. An attacker who supplies a crafted file to tiffcrop (likely via tricking a user to run tiffcrop on it with certain parameters) could cause a crash or in some cases, further exploitation.
PUBLISHED: 2022-08-17
libtiff's tiffcrop utility has a improper input validation flaw that can lead to out of bounds read and ultimately cause a crash if an attacker is able to supply a crafted file to tiffcrop.
PUBLISHED: 2022-08-17
libtiff's tiffcrop tool has a uint32_t underflow which leads to out of bounds read and write in the extractContigSamples8bits routine. An attacker who supplies a crafted file to tiffcrop could trigger this flaw, most likely by tricking a user into opening the crafted file with tiffcrop. Triggering t...
PUBLISHED: 2022-08-17
The Zoom Client for Meetings for MacOS (Standard and for IT Admin) before version 5.11.3 contains a vulnerability in the package signature validation during the update process. A local low-privileged user could exploit this vulnerability to escalate their privileges to root.
PUBLISHED: 2022-08-17
Zoom Rooms for Conference Rooms for Windows versions before 5.11.0 are susceptible to a Local Privilege Escalation vulnerability. A local low-privileged malicious user could exploit this vulnerability to escalate their privileges to the SYSTEM user.