Endpoint

10/19/2018
12:30 PM
John Klossner
John Klossner
Cartoon Contest
100%
0%

Cartoon: Body Metrics

John Klossner has been drawing technology cartoons for more than 15 years. His work regularly appears in Computerworld and Federal Computer Week. His illustrations and cartoons have also been published in The New Yorker, Barron's, and The Wall Street Journal. Web site: ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Page 1 / 2   >   >>
dskquality
100%
0%
dskquality,
User Rank: Apprentice
11/9/2018 | 10:47:58 AM
Re: Check out the latest from John Klossner
You know, at first glance, I liked the idea of wearable tech.. Never through it would be a security risk.
REISEN1955
100%
0%
REISEN1955,
User Rank: Ninja
11/5/2018 | 10:29:47 AM
Re: The Bright Side
Did you really say we'll make the deal or give you the clothes off our back?
PanamaVet
50%
50%
PanamaVet,
User Rank: Strategist
11/5/2018 | 9:07:20 AM
The Bright Side
We were the top site on Insecam yesterday!
TimBerdon
50%
50%
TimBerdon,
User Rank: Apprentice
11/2/2018 | 3:44:58 PM
Scanning
I know that Coverity is expensive, but it now does Firmware, Software, and Underwear scanning.
meonly
100%
0%
meonly,
User Rank: Strategist
10/31/2018 | 11:50:41 AM
Latest Access Control Security Implementation
You know I always knew our company's security was top-notch but with this latest security measure I think they went to far.
FKREITZBERG980
100%
0%
FKREITZBERG980,
User Rank: Moderator
10/26/2018 | 4:48:02 PM
Smart Home
That was not what I was expecting from a presentation titled "Exposing the Privacy Risk of the Smart Home"
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
10/23/2018 | 4:12:35 PM
Re: Check out the latest from John Klossner
There's yet another suggestive joke in there somewhere about the "Something You Do" biometrics factor...
REISEN1955
100%
0%
REISEN1955,
User Rank: Ninja
10/23/2018 | 10:54:35 AM
Re: Check out the latest from John Klossner
Sam and Rose have taken security tranparency to the next level.
M0nk3
25%
75%
M0nk3,
User Rank: Strategist
10/23/2018 | 12:57:00 AM
Just try and relax...
At first I thought; McAfee has gotten a little too literal with their new Endpoint Security implementation.  Now I find it's not a bad way to spend a morning, and it's brought me and the misses closer together.
SXDude
67%
33%
SXDude,
User Rank: Strategist
10/22/2018 | 11:45:35 AM
Vegas Baby
Vegas hotels trail new security measures for 2019 Black Hat event.
Page 1 / 2   >   >>
Crowdsourced vs. Traditional Pen Testing
Alex Haynes, Chief Information Security Officer, CDL,  3/19/2019
BEC Scammer Pleads Guilty
Dark Reading Staff 3/20/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Well, at least it isn't Mobby Dick!
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
The State of Cyber Security Incident Response
The State of Cyber Security Incident Response
Organizations are responding to new threats with new processes for detecting and mitigating them. Here's a look at how the discipline of incident response is evolving.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-20165
PUBLISHED: 2019-03-22
Cross-site scripting (XSS) vulnerability in OpenText Portal 7.4.4 allows remote attackers to inject arbitrary web script or HTML via the vgnextoid parameter to a menuitem URI.
CVE-2019-1716
PUBLISHED: 2019-03-22
A vulnerability in the web-based management interface of Session Initiation Protocol (SIP) Software for Cisco IP Phone 7800 Series and Cisco IP Phone 8800 Series could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition or execute arbitrary code. The vulnerability ...
CVE-2019-1763
PUBLISHED: 2019-03-22
A vulnerability in the web-based management interface of Session Initiation Protocol (SIP) Software for Cisco IP Phone 8800 Series could allow an unauthenticated, remote attacker to bypass authorization, access critical services, and cause a denial of service (DoS) condition. The vulnerability exist...
CVE-2019-1764
PUBLISHED: 2019-03-22
A vulnerability in the web-based management interface of Session Initiation Protocol (SIP) Software for Cisco IP Phone 8800 Series could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack. The vulnerability is due to insufficient CSRF protections for the ...
CVE-2019-1765
PUBLISHED: 2019-03-22
A vulnerability in the web-based management interface of Session Initiation Protocol (SIP) Software for Cisco IP Phone 8800 Series could allow an authenticated, remote attacker to write arbitrary files to the filesystem. The vulnerability is due to insufficient input validation and file-level permis...