What can be done about the rising click interception threat?

Ad networks’ increasingly successful efforts to detect bot-based ad click fraud has forced attackers to focus more on intercepting and redirecting legitimate users’ clicks. How widespread is the practice? A group of researchers from Microsoft Res… Continue reading What can be done about the rising click interception threat?

Clickjacking Attacks: What They Are and How to Prevent Them

Clickjacking refers to any attack where the user is tricked into unintentionally clicking an unexpected web page element. The name was coined from click hijacking, and the technique is most often applied to web pages by overlaying malicious content ove… Continue reading Clickjacking Attacks: What They Are and How to Prevent Them

Modern browser APIs can be abused for hijacking device resources

Powerful capabilities of modern browser APIs could be misused by attackers to take control of a site visitor’s browser, add it to their botnet, and use it for a variety of malicious actions, researchers from the Foundation for Research and Technology &… Continue reading Modern browser APIs can be abused for hijacking device resources

Clickjacking when essential JavaScript code accesses attribute of ‘top’?

Given a website which doesn’t use any protection specifically against Clickjacking (no X-Frame-Options or CSP), but which does access an attribute of top in essential JavaScript code, eg:

// http://localhost/jack.html
<sc… Continue reading Clickjacking when essential JavaScript code accesses attribute of ‘top’?

Three C-Words of Web App Security: Part 3 – Clickjacking

This is the third and final part in this three-part series, Three C-Words of Web Application Security. I wrote a sort of prologue back in April, called A Brief Evolution of Web Apps, just to set the scene for those less versed in web application histor… Continue reading Three C-Words of Web App Security: Part 3 – Clickjacking