What is Shellshock?
The bug can affect you through malicious requests sent to web servers you interact with, or it can affect your devices directly over insecure Wi-Fi® networks. Attackers can use this exploit to spread malware, steal data, turn your computer into a bot, send spam, or gain complete control over your computer. Shellshock is the latest online threat sent to disrupt us. It's a loophole that affects a piece of software called Bash found mainly in Linux® or Unix® operating systems as well as the Apple® MacOS® X. And while the Shellshock bug is more about web servers and other Internet devices, those can now be turned against your own, more personal devices.
The bug can affect you through malicious requests sent to web servers you interact with, or it can affect your devices directly over insecure Wi-Fi® networks. Attackers can use this exploit to spread malware, steal data, turn your computer into a bot, send spam, or gain complete control over your computer. Shellshock is the latest online threat sent to disrupt us. It's a loophole that affects a piece of software called Bash found mainly in Linux® or Unix® operating systems as well as the Apple® MacOS® X. And while the Shellshock bug is more about web servers and other Internet devices, those can now be turned against your own, more personal devices.
A few simple steps you can take
An increasing numbers of patches are being made world-wide to stamp out the bug and prevent further exploitation, however it still makes sense to reduce your exposure and follow some simple steps to ensure you are fully protected across all your devices.
Update your operating systems Look out for available patches for any web-enabled devices in your home | Look out for unusual activity Check your online accounts and also bear in mind that scammers will take advantage of this to send spam emails with dodgy links. | Change your passwords These alerts help remind us of the need to change our online passwords and have different ones for different sites to limit the risk. |
Always check that the websites you visit have fixed their vulnerability beforehand