Monthly Archives: February 2015
Top 5 security resolutions for 2015
Follow these top 5 security resolutions from We Live Security to make for a safer 2015.
The post Top 5 security resolutions for 2015 appeared first on We Live Security.
GLSA 201502-14 (Normal): grep
grep: Denial of Service
Nine bad botnets and the damage they did
Responsible for a great deal of the hacking, spamming and malware every day: here are some of the worst botnets of all time.
The post Nine bad botnets and the damage they did appeared first on We Live Security.
Linguistic Consistency In Translations @Avira
Translation processes do not start with the content transfer from one language to another. They start with the process of creating the source text. This source text will have a crucial impact on the later result. One tiny difference as the one between “Real Time Protection”, “Real-Time Protection” and “real time protection” can lead to multiple differences in the target text.
Let’s have a look at a really simple example, the word “email”; and one of our target languages, for example; French. “Email” has an official translation inside Avira’s terminology: “e-mail”. If the source text contains a tiny variation such as “e-mail” or “mail”, the terminology software will fail to find the term. Therefore, the end result might vary from “e-mail” to “adresse électronique”, “messagerie” or “messagerie électronique”. The difference, in this case, doesn’t seem that crucial. Anyway, all of them are synonyms, right? But when the difference affects a product name or a feature name the problem starts to grow bigger.
At Avira we also have examples of these problems with feature names. “Remote Yell”, “Remote Alarm”, “Trigger Scream” and “Remote Scream” are used as names for the same feature. This usually leads to even more different translations, which confuse the user.
Of course, consistency problems do not end in the source text, they are also important to solve in the target content. It is important to adapt the terms to the target culture and accomplish a consistent language within it. This way the user will feel the message as if it was originally written in the target language.
Why value linguistic consistency?
Linguistic consistency keeps users happy and prevents them from finding conflicting, poorly written, or unintentionally humorous content.
On the other hand, linguistic inconsistency—for example, at the company’s webpage—can give the impression that the company does not value its customers or the market it is addressing to. Regarding software localization, consistency helps to have a user friendly interface, where it is clear what the program is referring to.
Linguistic consistency saves us time. New translations always take time and effort. Even a three words translation can take up to one working day. Sometimes, similar sentences already exist inside the company’s TM, so why not use them? Linguistic consistency also saves us money, as simple as the fact that using a previous translation prevents from spending on new ones.
From the user interface, to the documentation, the social media, the customer support to the marketing texts, a company needs to address to concepts in a clear and consistent way. Just imagine for a second one of our era giants wouldn’t care so much about this subject. We will be still trying to differentiate “G Earth” from “G Land”, “G Globe” and “G World”. Seems like the perfect nightmare material.
The post Linguistic Consistency In Translations @Avira appeared first on Avira Blog.
RHSA-2015:0265-1: Critical: firefox security update
Red Hat Enterprise Linux: Updated firefox packages that fix multiple security issues are now
available for Red Hat Enterprise Linux 5, 6 and 7.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
CVE-2015-0822, CVE-2015-0827, CVE-2015-0831, CVE-2015-0836
RHSA-2015:0264-1: Low: Red Hat Satellite IBM Java Runtime security update
RHN Satellite and Proxy: Updated java-1.6.0-ibm packages that fix several security issues are now
available for Red Hat Satellite 5.6.
Red Hat Product Security has rated this update as having Low security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
CVE-2014-3065, CVE-2014-3068, CVE-2014-3566, CVE-2014-4209, CVE-2014-4218, CVE-2014-4219, CVE-2014-4227, CVE-2014-4244, CVE-2014-4252, CVE-2014-4262, CVE-2014-4263, CVE-2014-4265, CVE-2014-4288, CVE-2014-6457, CVE-2014-6458, CVE-2014-6492, CVE-2014-6493, CVE-2014-6502, CVE-2014-6503, CVE-2014-6506, CVE-2014-6511, CVE-2014-6512, CVE-2014-6515, CVE-2014-6531, CVE-2014-6532, CVE-2014-6558, CVE-2014-6585, CVE-2014-6587, CVE-2014-6591, CVE-2014-6593, CVE-2014-8891, CVE-2014-8892, CVE-2015-0395, CVE-2015-0403, CVE-2015-0406, CVE-2015-0407, CVE-2015-0408, CVE-2015-0410, CVE-2015-0412
RHSA-2015:0263-1: Low: Red Hat Satellite IBM Java Runtime security update
RHN Satellite and Proxy: Updated java-1.6.0-ibm packages that fix several security issues are now
available for Red Hat Satellite 5.7.
Red Hat Product Security has rated this update as having Low security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
CVE-2014-6585, CVE-2014-6587, CVE-2014-6591, CVE-2014-6593, CVE-2014-8891, CVE-2014-8892, CVE-2015-0395, CVE-2015-0403, CVE-2015-0406, CVE-2015-0407, CVE-2015-0408, CVE-2015-0410, CVE-2015-0412
USN-2510-1: FreeType vulnerabilities
Ubuntu Security Notice USN-2510-1
24th February, 2015
freetype vulnerabilities
A security issue affects these releases of Ubuntu and its
derivatives:
- Ubuntu 14.10
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS
- Ubuntu 10.04 LTS
Summary
FreeType could be made to crash or run programs as your login if it opened
a specially crafted file.
Software description
- freetype
– FreeType 2 is a font engine library
Details
Mateusz Jurczyk discovered that FreeType did not correctly handle certain
malformed font files. If a user were tricked into using a specially crafted
font file, a remote attacker could cause FreeType to crash or possibly
execute arbitrary code with user privileges.
Update instructions
The problem can be corrected by updating your system to the following
package version:
- Ubuntu 14.10:
-
libfreetype6
2.5.2-2ubuntu1.1
- Ubuntu 14.04 LTS:
-
libfreetype6
2.5.2-1ubuntu2.4
- Ubuntu 12.04 LTS:
-
libfreetype6
2.4.8-1ubuntu2.2
- Ubuntu 10.04 LTS:
-
libfreetype6
2.3.11-1ubuntu2.8
To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.
After a standard system update you need to restart your session to make
all the necessary changes.
References
CVE-2015-0819 (firefox)
The UITour::onPageEvent function in Mozilla Firefox before 36.0 does not ensure that an API call originates from a foreground tab, which allows remote attackers to conduct spoofing and clickjacking attacks by leveraging access to a UI Tour web site.