Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operations

3/8/2016
01:30 PM
Marilyn Cohodas
Marilyn Cohodas
Commentary
Connect Directly
Twitter
LinkedIn
RSS
E-Mail vvv
50%
50%

Forgot My Password: Caption Contest Winners Announced

Sticky notes, clouds and authentication jokes. And the winning caption is...

From sticky notes to clouds and authentication puns, the Dark Reading cartoon caption contest brought out the humorists in our community with some hysterical word-play tinged with geek. More than 100 of you submitted entries -- and many hundreds more laughed and cheered the contestants on. 

And so it is with great pleasure that I announce the winner: Dark Reading community member jeberha3 for the hysterical submission pictured below:

Jeberha3 takes home a $25 Starbucks gift card, and will receive a signed copy of the cartoon by John Klossner, who helped judge the contest along with the Dark Reading editorial team: Tim Wilson, Kelly Jackson Higgins, Sara Peters and yours truly. 

Honorable mention (and a $10 Starbucks card) go to Tom Robey (aka TomR518) a network security engineer at Computer Enhancement Systems for the clever “If you used two-factor authentication, I can't wait to see what's coming next,” and Chris Page (nipsy’s) witty "Is the six upper or lower case?"  – a question he says he's been asked more than a few times in real life.

Thanks again to everyone who entered the contest. If you haven’t yet read all the captions, be sure to check them out today.

 

Marilyn has been covering technology for business, government, and consumer audiences for over 20 years. Prior to joining UBM, Marilyn worked for nine years as editorial director at TechTarget Inc., where she launched six Websites for IT managers and administrators supporting ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
3/11/2016 | 7:16:37 AM
Re: Congrats!
Better luck next time, Joe! Or even better, tell you girlfriend to register and post her own entry! 
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
3/10/2016 | 8:02:32 PM
Congrats!
Aw.  Well, it's just as well.  "My" best one wasn't really mine; it was a suggestion by my girlfriend.  ( darkreading.com/messages.asp?piddl_msgthreadid=26476&piddl_msgid=316999#msg_316999 )C

Congratulations to the winners!  Excellent grand prize choice!
Stop Defending Everything
Kevin Kurzawa, Senior Information Security Auditor,  2/12/2020
Small Business Security: 5 Tips on How and Where to Start
Mike Puglia, Chief Strategy Officer at Kaseya,  2/13/2020
Architectural Analysis IDs 78 Specific Risks in Machine-Learning Systems
Jai Vijayan, Contributing Writer,  2/13/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
How Enterprises Are Developing and Maintaining Secure Applications
How Enterprises Are Developing and Maintaining Secure Applications
The concept of application security is well known, but application security testing and remediation processes remain unbalanced. Most organizations are confident in their approach to AppSec, although others seem to have no approach at all. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-1811
PUBLISHED: 2020-02-18
GaussDB 200 with version of 6.5.1 have a command injection vulnerability. Due to insufficient input validation, remote attackers with low permissions could exploit this vulnerability by sending crafted commands to the affected device. Successful exploit could allow an attacker to execute commands.
CVE-2020-1815
PUBLISHED: 2020-02-18
Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00; Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00 have a memory leak vulnerability. The software does not sufficiently track and release allocated memory while parse...
CVE-2020-1816
PUBLISHED: 2020-02-18
Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00; Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00 have a Denial of Service (DoS) vulnerability. Due to improper processing of specific IPSEC packets, remote attacker...
CVE-2020-1830
PUBLISHED: 2020-02-18
Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00; Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00 have a vulnerability that a memory management error exists when IPSec Module handing a specific message. This cause...
CVE-2020-1882
PUBLISHED: 2020-02-18
Huawei mobile phones Ever-L29B versions earlier than 10.0.0.180(C185E6R3P3), earlier than 10.0.0.180(C432E6R1P7), earlier than 10.0.0.180(C636E5R2P3); HUAWEI Mate 20 RS versions earlier than 10.0.0.175(C786E70R3P8); HUAWEI Mate 20 X versions earlier than 10.0.0.176(C00E70R2P8); and Honor Magic2 vers...