Operations

2/6/2018
10:00 AM
John Klossner
John Klossner
Cartoon Contest

Name That Toon: Disappearing Act

We provide the cartoon. You provide the caption.
We provide the cartoon. You provide the caption.

Comment  | 
Print  | 
Comments
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 8 / 9   >   >>
MarileeP681
0%
100%
MarileeP681,
User Rank: Apprentice
2/13/2018 | 9:58:08 AM
He should have made a new pot of coffee when he took the last cup.
He should have made a new pot of coffee when he took the last cup.
jabeatty
0%
100%
jabeatty,
User Rank: Strategist
2/13/2018 | 9:23:11 AM
Caption
Wow. Dave really isn't here, man.
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
2/13/2018 | 8:56:31 AM
Re: Caption Contest
Bill realized his delete key indeed held magical powers.
DocSwamp
50%
50%
DocSwamp,
User Rank: Apprentice
2/12/2018 | 5:49:45 PM
Caption Contest
I think the Cyber Security folks set the Virus definition sensitivity a little too high. I thought she only had a cold.
glitz
0%
100%
glitz,
User Rank: Apprentice
2/12/2018 | 4:05:06 PM
Caption Contest
I thought they patched that vulnerabilty!
REISEN1955
0%
100%
REISEN1955,
User Rank: Ninja
2/12/2018 | 1:52:22 PM
Re: Caption
Fred and Irma realized that the company's termination protocol had turned severe. 
BrianN060
0%
100%
BrianN060,
User Rank: Ninja
2/12/2018 | 12:55:02 PM
Caption
Second thoughts about the company's early retirement offer?
michaelgop
100%
0%
michaelgop,
User Rank: Apprentice
2/12/2018 | 11:47:20 AM
Correction
Don't worry, it's just a market correction. He'll bounce back...
33jjj
50%
50%
33jjj,
User Rank: Apprentice
2/10/2018 | 7:08:21 PM
Name That Toon
The fall quarter seems to really be getting to him.
FKREITZBERG980
0%
100%
FKREITZBERG980,
User Rank: Strategist
2/8/2018 | 7:34:19 PM
Caption Contest Entry
John was checking his 401K. Market must be down again.
<<   <   Page 8 / 9   >   >>
Election Websites, Back-End Systems Most at Risk of Cyberattack in Midterms
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/14/2018
Intel Reveals New Spectre-Like Vulnerability
Curtis Franklin Jr., Senior Editor at Dark Reading,  8/15/2018
Australian Teen Hacked Apple Network
Dark Reading Staff 8/17/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Flash Poll
The State of IT and Cybersecurity
The State of IT and Cybersecurity
IT and security are often viewed as different disciplines - and different departments. Find out what our survey data revealed, read the report today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-1732
PUBLISHED: 2018-08-17
IBM Security Access Manager for Enterprise Single Sign-On 8.2.2 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sen...
CVE-2018-15356
PUBLISHED: 2018-08-17
An authenticated attacker can execute arbitrary code using command ejection in Eltex ESP-200 firmware version 1.2.0.
CVE-2018-15357
PUBLISHED: 2018-08-17
An authenticated attacker with low privileges can extract password hash information for all users in Eltex ESP-200 firmware version 1.2.0.
CVE-2018-15358
PUBLISHED: 2018-08-17
An authenticated attacker with low privileges can activate high privileged user and use it to expand attack surface in Eltex ESP-200 firmware version 1.2.0.
CVE-2018-15359
PUBLISHED: 2018-08-17
An authenticated attacker with low privileges can use insecure sudo configuration to expand attack surface in Eltex ESP-200 firmware version 1.2.0.