Operations

2/6/2018
10:00 AM
John Klossner
John Klossner
Cartoon Contest
50%
50%

Name That Toon: Disappearing Act

We provide the cartoon. You provide the caption.
We provide the cartoon. You provide the caption.

Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card. If you don't want to enter a caption, help us pick a winner by voting on the submissions. Click thumbs up for those you find funny; thumbs down, not so. As always, editorial comments are encouraged and welcomed.

Click here for contest rules. For advice on how to beat the competition, check out How To Win A Cartoon Caption Contest. The contest closes March 9.

John Klossner has been drawing technology cartoons for more than 15 years. His work regularly appears in Computerworld and Federal Computer Week. His illustrations and cartoons have also been published in The New Yorker, Barron's, and The Wall Street Journal. Web site: ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 9 / 9
alwrick
0%
100%
alwrick,
User Rank: Apprentice
2/8/2018 | 1:44:12 PM
Deep Learning as a caption?
What do you mean Deep Learning?
DavidRandolph
50%
50%
DavidRandolph,
User Rank: Apprentice
2/7/2018 | 4:52:02 PM
Caption
I told him not to print out the security policies.
jthomaj
50%
50%
jthomaj,
User Rank: Apprentice
2/7/2018 | 7:59:53 AM
Name That Toon
'Mind the gender gap'
JohnM217
40%
60%
JohnM217,
User Rank: Strategist
2/6/2018 | 5:20:26 PM
Re: Caption
It looks like John fell victim to a sinkhole attach.
Vexel
100%
0%
Vexel,
User Rank: Apprentice
2/6/2018 | 10:38:41 AM
Caption Contest Entry
"We should've read the 'Rules of Engagement' section for the Penetration Testing more closely."
ianrod
50%
50%
ianrod,
User Rank: Strategist
2/6/2018 | 10:32:40 AM
Caption
About that Meltdown patch...
<<   <   Page 9 / 9
Why CISOs Need a Security Reality Check
Joel Fulton, Chief Information Security Officer for Splunk,  6/13/2018
Cisco Talos Summit: Network Defenders Not Serious Enough About Attacks
Curtis Franklin Jr., Senior Editor at Dark Reading,  6/13/2018
Meet 'Bro': The Best-Kept Secret of Network Security
Greg Bell, CEO, Corelight,  6/14/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
The State of IT and Cybersecurity
The State of IT and Cybersecurity
IT and security are often viewed as different disciplines - and different departments. Find out what our survey data revealed, read the report today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-12294
PUBLISHED: 2018-06-19
WebCore/platform/graphics/texmap/TextureMapperLayer.cpp in WebKit, as used in WebKitGTK+ prior to version 2.20.2, is vulnerable to a use after free for a WebCore::TextureMapperLayer object.
CVE-2018-12519
PUBLISHED: 2018-06-19
An issue was discovered in ShopNx through 2017-11-17. The vulnerability allows a remote attacker to upload any malicious file to a Node.js application. An attacker can upload a malicious HTML file that contains a JavaScript payload to steal a user's credentials.
CVE-2018-12588
PUBLISHED: 2018-06-19
Cross-site scripting (XSS) vulnerability in templates/frontend/pages/searchResults.tpl in Public Knowledge Project (PKP) Open Monograph Press (OMP) v1.2.0 through 3.1.1-1 before 3.1.1-2 allows remote attackers to inject arbitrary web script or HTML via the catalog.noTitlesSearch parameter (aka the S...
CVE-2018-10811
PUBLISHED: 2018-06-19
strongSwan 5.6.0 and older allows Remote Denial of Service because of Missing Initialization of a Variable.
CVE-2018-10945
PUBLISHED: 2018-06-19
The mg_handle_cgi function in mongoose.c in Mongoose 6.11 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash, or NULL pointer dereference) via an HTTP request, related to the mbuf_insert function.