So last week the tech world woke up to the news that Bash, a component in Linux had a flaw that had been around for 22 years. This flaw enabled 3rd parties to take control of a system, whether it was to run arbitrary code or simply gain control for nefarious purposes.
I got a call from the local radio to give them some background into the exploit and what can be done about it. I tried to keep it fairly basic as most of their listeners probably had less of a technical background that I was used to. Have a listen:
Any suggestions to improve for next time would be appreciated. (Yeah, lots of emms in there 🙁 )