Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

2/8/2019
11:15 AM
John Klossner
John Klossner
Cartoon Contest
100%
0%

Cartoon: Connected Car Security

John Klossner has been drawing technology cartoons for more than 15 years. His work regularly appears in Computerworld and Federal Computer Week. His illustrations and cartoons have also been published in The New Yorker, Barron's, and The Wall Street Journal. Web site: ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Page 1 / 2   >   >>
lakers85
100%
0%
lakers85,
User Rank: Strategist
3/6/2019 | 9:04:44 AM
Shotgun
Ummmm, I called shotgun...
mhhf1ve
50%
50%
mhhf1ve,
User Rank: Apprentice
3/5/2019 | 1:11:29 PM
There is no car...
Where we're going, there are no roads...
WallyDragon
100%
0%
WallyDragon,
User Rank: Strategist
3/1/2019 | 6:29:57 AM
Let me just check...
...is this a secure line I'm on?
Len Sebesta
50%
50%
Len Sebesta,
User Rank: Strategist
2/27/2019 | 12:15:09 PM
Re: Car or no car
I with you on that one Joe.
Joe Stanganelli
0%
100%
Joe Stanganelli,
User Rank: Ninja
2/23/2019 | 11:03:19 PM
Car or no car
The "connected car" aspect didn't even strike me as first, literally. I took this as a figurative representation of all tech/digital-transformation initiatives!
MarcM
100%
0%
MarcM,
User Rank: Strategist
2/21/2019 | 7:55:30 AM
Business drag
We won't cut you loose as long as you don't slow us down!
acampbell448
100%
0%
acampbell448,
User Rank: Strategist
2/20/2019 | 11:01:53 AM
Move Fast
Security?   Our motto is Move Fast and Break things.
jrig1842
50%
50%
jrig1842,
User Rank: Strategist
2/20/2019 | 9:02:48 AM
Security Clearance
It's clear even Security is not sure what to do for self driving cars 
REISEN1955
0%
100%
REISEN1955,
User Rank: Ninja
2/20/2019 | 7:57:47 AM
Re: New Cartoon! Check it out...
Dang - he really wants to be serious about websurfing!
TheVampireO
100%
0%
TheVampireO,
User Rank: Strategist
2/15/2019 | 3:02:30 PM
Forethought
I know I'm just the intern, but I don't think you put much forethought into security...
Page 1 / 2   >   >>
For Cybersecurity to Be Proactive, Terrains Must Be Mapped
Craig Harber, Chief Technology Officer at Fidelis Cybersecurity,  10/8/2019
How to Think Like a Hacker
Dr. Giovanni Vigna, Chief Technology Officer at Lastline,  10/10/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-17223
PUBLISHED: 2019-10-15
There is HTML Injection in the Note field in Dolibarr ERP/CRM 10.0.2 via user/note.php.
CVE-2019-17593
PUBLISHED: 2019-10-14
JIZHICMS 1.5.1 allows admin.php/Admin/adminadd.html CSRF to add an administrator.
CVE-2019-17594
PUBLISHED: 2019-10-14
There is a heap-based buffer over-read in the _nc_find_entry function in tinfo/comp_hash.c in the terminfo library in ncurses before 6.1-20191012.
CVE-2019-17595
PUBLISHED: 2019-10-14
There is a heap-based buffer over-read in the fmt_entry function in tinfo/comp_hash.c in the terminfo library in ncurses before 6.1-20191012.
CVE-2019-14823
PUBLISHED: 2019-10-14
A flaw was found in the "Leaf and Chain" OCSP policy implementation in JSS' CryptoManager versions after 4.4.6, 4.5.3, 4.6.0, where it implicitly trusted the root certificate of a certificate chain. Applications using this policy may not properly verify the chain and could be vulnerable to...