Endpoint

7/10/2018
12:30 PM
John Klossner
John Klossner
Cartoon Contest

Name That Toon: Mobile Threat

We provide the cartoon. You provide the caption.
We provide the cartoon. You provide the caption.

Comment  | 
Print  | 
Comments
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 2 / 3   >   >>
sgtljb
100%
0%
sgtljb,
User Rank: Apprentice
7/12/2018 | 2:55:35 PM
Caption Contest
Kid: I wish you can make my Android Cyber Secure. Genie:Kid you ask too much! Buy an Apple!
JoeB1Kanobe
50%
50%
JoeB1Kanobe,
User Rank: Apprentice
7/12/2018 | 12:58:50 PM
World Peace
"World Peace would be easier than getting more than 1 bar here"
acampbell448
0%
100%
acampbell448,
User Rank: Ninja
7/12/2018 | 10:11:16 AM
Just Dreamin....
I will grant you an extra wish if you hook me up with Barbara Eden!
jmansier
0%
100%
jmansier,
User Rank: Apprentice
7/12/2018 | 8:47:08 AM
Caption Content!
"Dang this new 2FA is amazing!" 
Therion
50%
50%
Therion,
User Rank: Apprentice
7/11/2018 | 9:54:35 PM
Chicken Dinner
"You really want to use a wish to improve Windows Updates?"
SubKleener
67%
33%
SubKleener,
User Rank: Apprentice
7/11/2018 | 5:58:37 PM
To make your first wish, click on the link below...
To make your first wish, click on the link below...
GWAIN
50%
50%
GWAIN,
User Rank: Strategist
7/11/2018 | 4:54:34 PM
HTML5 Popups
You are today's 99th winner of an Amazon gift card!
Mike Atkinson
33%
67%
Mike Atkinson,
User Rank: Apprentice
7/11/2018 | 2:14:26 PM
Name that toon: Mobile Threat
"You're seeing this ad because you recently visited websites loosely related to genies. To opt out..."
Kristendean80
50%
50%
Kristendean80,
User Rank: Strategist
7/11/2018 | 2:02:40 PM
Name That Toon: Mobile Threat
" You should have wished for longer battery life. Your phone goes dead in 3..2....."
Joe Stanganelli
33%
67%
Joe Stanganelli,
User Rank: Ninja
7/11/2018 | 12:01:42 PM
jgen03
"For the last time, you can't apply the += operator to my_wishes."
<<   <   Page 2 / 3   >   >>
What We Talk About When We Talk About Risk
Jack Jones, Chairman, FAIR Institute,  7/11/2018
Ticketmaster Breach Part of Massive Payment Card Hacking Campaign
Jai Vijayan, Freelance writer,  7/10/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-14084
PUBLISHED: 2018-07-16
An issue was discovered in a smart contract implementation for MKCB, an Ethereum token. If the owner sets the value of sellPrice to a large number in setPrices() then the &quot;amount * sellPrice&quot; will cause an integer overflow in sell().
CVE-2018-14085
PUBLISHED: 2018-07-16
An issue was discovered in a smart contract implementation for UserWallet 0x0a7bca9FB7AfF26c6ED8029BB6f0F5D291587c42, an Ethereum token. First, suppose that the owner adds the evil contract address to his sweepers. The evil contract looks like this: contract Exploit { uint public start; function swe...
CVE-2018-14086
PUBLISHED: 2018-07-16
An issue was discovered in a smart contract implementation for SingaporeCoinOrigin (SCO), an Ethereum token. The contract has an integer overflow. If the owner sets the value of sellPrice to a large number in setPrices() then the &quot;amount * sellPrice&quot; will cause an integer overflow in sell(...
CVE-2018-14087
PUBLISHED: 2018-07-16
An issue was discovered in a smart contract implementation for EUC (EUC), an Ethereum token. The contract has an integer overflow. If the owner sets the value of buyPrice to a large number in setPrices() then the &quot;msg.value * buyPrice&quot; will cause an integer overflow in the fallback functio...
CVE-2018-14088
PUBLISHED: 2018-07-16
An issue was discovered in a smart contract implementation for STeX White List (STE(WL)), an Ethereum token. The contract has an integer overflow. If the owner sets the value of amount to a large number then the &quot;amount * 1000000000000000&quot; will cause an integer overflow in withdrawToFounde...