Update: 1:00 p.m. ET: New software updates have been released to protect users from the Shellshock bug.
On September 29, Apple released three security flaw patches for OS X Mavericks, Mountain Lion, and Lion to combat the bug. Concerned users can click here for more information regarding software updates for Mac OS X.
Red Hat, an open source software company, has been actively releasing patches for Linux users. A full list can be found here.
A security vulnerability in the highly-used software Bash, short for Bourne-Again Shell, exposed the Shellshock bug earlier this week.
Bash is a command-line shell that allows users to run commands and launch programs by typing in text. It is used in more than 70 percent of web-connected devices and is present in countless networks and websites that use Unix or Linux operating systems.
Shellshock doesn’t just attack computers; the bug can infect almost any web-connected device including servers, mobile devices, tablets, web-connected cameras, home security systems and more. It will grant hackers full access to your device or computer. They can then add, modify, or delete information as they wish.
This is especially concerning for corporations and small businesses that have an abundance of confidential, financial and customer information stored on their computers. Consumers may be faced with an increase in data breaches — exposing personal information — as a result of the bug.
Software companies are expected to release numerous software updates in the upcoming days. With the National Vulnerability Database already rating Shellshock a 10/10 in severity, consumers and businesses are urged to take action as soon as a patch becomes available.
For more information on cyber attacks, please visit Fighting Identity Crime’s Cybersecurity Center.
The views and opinions expressed in this article are those of EZShield Inc. alone and do not necessarily reflect the opinions of any other person or entity, including specifically any person or entity affiliated with the distribution or display of this content.