Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operations

3/8/2016
01:30 PM
Marilyn Cohodas
Marilyn Cohodas
Commentary
Connect Directly
Twitter
LinkedIn
RSS
E-Mail vvv
50%
50%

Forgot My Password: Caption Contest Winners Announced

Sticky notes, clouds and authentication jokes. And the winning caption is...

From sticky notes to clouds and authentication puns, the Dark Reading cartoon caption contest brought out the humorists in our community with some hysterical word-play tinged with geek. More than 100 of you submitted entries -- and many hundreds more laughed and cheered the contestants on. 

And so it is with great pleasure that I announce the winner: Dark Reading community member jeberha3 for the hysterical submission pictured below:

Jeberha3 takes home a $25 Starbucks gift card, and will receive a signed copy of the cartoon by John Klossner, who helped judge the contest along with the Dark Reading editorial team: Tim Wilson, Kelly Jackson Higgins, Sara Peters and yours truly. 

Honorable mention (and a $10 Starbucks card) go to Tom Robey (aka TomR518) a network security engineer at Computer Enhancement Systems for the clever “If you used two-factor authentication, I can't wait to see what's coming next,” and Chris Page (nipsy’s) witty "Is the six upper or lower case?"  – a question he says he's been asked more than a few times in real life.

Thanks again to everyone who entered the contest. If you haven’t yet read all the captions, be sure to check them out today.

 

Marilyn has been covering technology for business, government, and consumer audiences for over 20 years. Prior to joining UBM, Marilyn worked for nine years as editorial director at TechTarget Inc., where she launched six Websites for IT managers and administrators supporting ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
3/11/2016 | 7:16:37 AM
Re: Congrats!
Better luck next time, Joe! Or even better, tell you girlfriend to register and post her own entry! 
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
3/10/2016 | 8:02:32 PM
Congrats!
Aw.  Well, it's just as well.  "My" best one wasn't really mine; it was a suggestion by my girlfriend.  ( darkreading.com/messages.asp?piddl_msgthreadid=26476&piddl_msgid=316999#msg_316999 )C

Congratulations to the winners!  Excellent grand prize choice!
For Cybersecurity to Be Proactive, Terrains Must Be Mapped
Craig Harber, Chief Technology Officer at Fidelis Cybersecurity,  10/8/2019
A Realistic Threat Model for the Masses
Lysa Myers, Security Researcher, ESET,  10/9/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-10759
PUBLISHED: 2019-10-15
safer-eval before 1.3.4 are vulnerable to Arbitrary Code Execution. A payload using constructor properties can escape the sandbox and execute arbitrary code.
CVE-2019-10760
PUBLISHED: 2019-10-15
safer-eval before 1.3.2 are vulnerable to Arbitrary Code Execution. A payload using constructor properties can escape the sandbox and execute arbitrary code.
CVE-2019-17397
PUBLISHED: 2019-10-15
In the DoorDash application through 11.5.2 for Android, the username and password are stored in the log during authentication, and may be available to attackers via logcat.
CVE-2019-12944
PUBLISHED: 2019-10-15
Glue Smart Lock 2.7.8 devices do not properly block guest access in certain situations where the network connection is unavailable.
CVE-2019-17195
PUBLISHED: 2019-10-15
Connect2id Nimbus JOSE+JWT before v7.9 can throw various uncaught exceptions while parsing a JWT, which could result in an application crash (potential information disclosure) or a potential authentication bypass.