Endpoint

10/19/2018
12:30 PM
John Klossner
John Klossner
Cartoon Contest
100%
0%

Cartoon: Body Metrics

John Klossner has been drawing technology cartoons for more than 15 years. His work regularly appears in Computerworld and Federal Computer Week. His illustrations and cartoons have also been published in The New Yorker, Barron's, and The Wall Street Journal. Web site: ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Page 1 / 2   >   >>
dskquality
100%
0%
dskquality,
User Rank: Apprentice
11/9/2018 | 10:47:58 AM
Re: Check out the latest from John Klossner
You know, at first glance, I liked the idea of wearable tech.. Never through it would be a security risk.
REISEN1955
100%
0%
REISEN1955,
User Rank: Ninja
11/5/2018 | 10:29:47 AM
Re: The Bright Side
Did you really say we'll make the deal or give you the clothes off our back?
PanamaVet
50%
50%
PanamaVet,
User Rank: Strategist
11/5/2018 | 9:07:20 AM
The Bright Side
We were the top site on Insecam yesterday!
TimBerdon
50%
50%
TimBerdon,
User Rank: Apprentice
11/2/2018 | 3:44:58 PM
Scanning
I know that Coverity is expensive, but it now does Firmware, Software, and Underwear scanning.
meonly
100%
0%
meonly,
User Rank: Strategist
10/31/2018 | 11:50:41 AM
Latest Access Control Security Implementation
You know I always knew our company's security was top-notch but with this latest security measure I think they went to far.
FKREITZBERG980
100%
0%
FKREITZBERG980,
User Rank: Strategist
10/26/2018 | 4:48:02 PM
Smart Home
That was not what I was expecting from a presentation titled "Exposing the Privacy Risk of the Smart Home"
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
10/23/2018 | 4:12:35 PM
Re: Check out the latest from John Klossner
There's yet another suggestive joke in there somewhere about the "Something You Do" biometrics factor...
REISEN1955
100%
0%
REISEN1955,
User Rank: Ninja
10/23/2018 | 10:54:35 AM
Re: Check out the latest from John Klossner
Sam and Rose have taken security tranparency to the next level.
M0nk3
25%
75%
M0nk3,
User Rank: Strategist
10/23/2018 | 12:57:00 AM
Just try and relax...
At first I thought; McAfee has gotten a little too literal with their new Endpoint Security implementation.  Now I find it's not a bad way to spend a morning, and it's brought me and the misses closer together.
SXDude
67%
33%
SXDude,
User Rank: Strategist
10/22/2018 | 11:45:35 AM
Vegas Baby
Vegas hotels trail new security measures for 2019 Black Hat event.
Page 1 / 2   >   >>
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "Now, we come here to play Paw-ke Man Go!"
Current Issue
The Year in Security 2018
This Dark Reading Tech Digest explores the biggest news stories of 2018 that shaped the cybersecurity landscape.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-6497
PUBLISHED: 2019-01-20
Hotels_Server through 2018-11-05 has SQL Injection via the controller/fetchpwd.php username parameter.
CVE-2018-18908
PUBLISHED: 2019-01-20
The Sky Go Desktop application 1.0.19-1 through 1.0.23-1 for Windows performs several requests over cleartext HTTP. This makes the data submitted in these requests prone to Man in The Middle (MiTM) attacks, whereby an attacker would be able to obtain the data sent in these requests. Some of the requ...
CVE-2019-6496
PUBLISHED: 2019-01-20
The ThreadX-based firmware on Marvell Avastar Wi-Fi devices allows remote attackers to execute arbitrary code or cause a denial of service (block pool overflow) via malformed Wi-Fi packets during identification of available Wi-Fi networks. Exploitation of the Wi-Fi device can lead to exploitation of...
CVE-2019-3773
PUBLISHED: 2019-01-18
Spring Web Services, versions 2.4.3, 3.0.4, and older unsupported versions of all three projects, were susceptible to XML External Entity Injection (XXE) when receiving XML data from untrusted sources.
CVE-2019-3774
PUBLISHED: 2019-01-18
Spring Batch versions 3.0.9, 4.0.1, 4.1.0, and older unsupported versions, were susceptible to XML External Entity Injection (XXE) when receiving XML data from untrusted sources.