-- Leo's gemini proxy

-- Connecting to gemini.tuxmachines.org:1965...

-- Connected

-- Sending request

-- Meta line: 20 text/gemini;lang=en-GB

Tux Machines


Security Leftovers


Posted by Roy Schestowitz on Oct 09, 2022


Games: Steam, Steam Deck, and Ultima Online Turns 25

Artillect's Brother AX-25 Typewriter Is Reborn as an Arduino and Raspberry Pi-Powered Linux Terminal



Free XSS Tools


↺ Free XSS Tools


> This tutorial describes both command line and graphical free XSS (Cross-site scripting) scanning and exploitation tools.


> After reading this tutorial you will know how to install and get started with the most popular free tools to find and exploit Cross-site scripting security holes.


> Some of the tools included in this tutorial are already included in Kali Linux and other security-oriented Linux distributions. Yet this tutorial also explains the installation process for all of them.



Bluetooth Security Risks


↺ Bluetooth Security Risks


> This tutorial explains about the Bluetooth security risks and the defensive measures to protect the data and privacy. After reading this tutorial, you’ll be aware of the dangers around your bluetooth devices and you will learn about bluetooth vulnerabilities and attack methods. Of course, the article focuses on the protective measures that you can take to secure your devices.


> This content is optimized for both regular bluetooth device users and users with knowledge on IT security, looking for deeper information on bluetooth security risks.



iTWire - Leading fruit, veg grower Costa Group leaks data after phishing attack


↺ iTWire - Leading fruit, veg grower Costa Group leaks data after phishing attack


> The Costa Group, Australia's leading grower, packer and marketer of fresh fruit and vegetables, has been hit by what it describes as "a malicious and sophisticated IT phishing attack" which could have resulted in passport, bank and superannuation details being leaked, as also tax file numbers.


> In a statement dated 6 October, the company said the attack had taken place on 21 August and it had commenced a review and recovery process with external security consultants from that date onwards.


> "As a result of this we have now established that access to data was confined to a single server at the Costa Corindi (NSW) site, which holds data for the berry category, and that only approximately 10% of the data on the Corindi file server was accessed," the statement said.


> Costa was started by Francesco Costa, a wine producer from Salina, Italy, who migrated to Australia to raise funds for his vineyard, according to information on the company's website. He worked in Melbourne, Colac and Geelong before returning to Italy in 1895. It operates in more than 30 rural and regional communities across Australia, with its business support centre located at Ravenhall in Victoria.



Canonical Launches New Free Tier for Its Security-Focused 'Ubuntu Pro'


↺ Canonical Launches New Free Tier for Its Security-Focused 'Ubuntu Pro'


> "Yes, you read that right, you get security patches not just for the operating system, but for all of Ubuntu's open-source applications for a decade."




gemini.tuxmachines.org

-- Response ended

-- Page fetched on Thu Jun 13 23:45:23 2024